<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://ipen.trialog.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Antoniok</id>
	<title>IPEN Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://ipen.trialog.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Antoniok"/>
	<link rel="alternate" type="text/html" href="https://ipen.trialog.com/wiki/Special:Contributions/Antoniok"/>
	<updated>2026-05-04T10:36:32Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.6</generator>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2208</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2208"/>
		<updated>2026-03-15T22:02:26Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;7709 IS Security and privacy-preserving guidelines for multi-sourced data processing&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Binsheng Zhang, Heung Youl Youm &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on identification of the security and privacy risks related to multi-sourced data processing, and related techniques to mitigate the risks. This document is applicable to organizations that use multi-sourced data or provide data services to design and develop multi-sourced data processing related systems, enhancing the security of their data processing activities&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/82889.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2026&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of &lt;br /&gt;
[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7709_Security_and_privacy_reference_architecture_for_multi-party_data_fusion_and_mining_(Started_in_April_2021_and_completed_in_October_2025) PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIS to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchestration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2207</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2207"/>
		<updated>2026-03-15T22:01:47Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 7709 IS Security and privacy-preserving guidelines for multi-sourced data processing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;7709 IS Security and privacy-preserving guidelines for multi-sourced data processing&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Binsheng Zhang, Heung Youl Youm &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on identification of the security and privacy risks related to multi-sourced data processing, and related techniques to mitigate the risks. This document is applicable to organizations that use multi-sourced data or provide data services to design and develop multi-sourced data processing related systems, enhancing the security of their data processing activities&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/82889.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2026&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of &lt;br /&gt;
[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7709_Security_and_privacy_reference_architecture_for_multi-party_data_fusion_and_mining_(Started_in_April_2021_and_completed_in_October_2025) PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIS to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2206</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2206"/>
		<updated>2026-03-15T21:56:01Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;7709 IS Security and privacy-preserving guidelines for multi-sourced data processing&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Binsheng Zhang, Heung Youl Youm &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on identification of the security and privacy risks related to multi-sourced data processing, and related techniques to mitigate the risks. This document is applicable to organizations that use multi-sourced data or provide data services to design and develop multi-sourced data processing related systems, enhancing the security of their data processing activities&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/82889.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2026&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIS to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Completed_study_periods_and_pwis&amp;diff=2205</id>
		<title>Completed study periods and pwis</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Completed_study_periods_and_pwis&amp;diff=2205"/>
		<updated>2026-03-15T21:54:40Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* ISO/IEC JTC 1/SC 27 Active Preliminary Work Items */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2015 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy engineering framework (Started in April 2015. Completed in April 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Matthias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study the concept of privacy engineering and see whether new work items are needed&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Slides presenting motivation for study period by Antonio Kung:&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:PRIPARE_Proposal_Study_Period_Privacy_Engineering_Framework_2.pdf http://ipen.trialog.com/wiki/File:PRIPARE_Proposal_Study_Period_Privacy_Engineering_Framework_2.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Timeline&lt;br /&gt;
| &amp;lt;div style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;&lt;br /&gt;
*Contributions by August 15th 2015.&lt;br /&gt;
**&amp;lt;span style=&amp;quot;line-height: 20.8px; background-color: rgb(255, 255, 0);&amp;quot;&amp;gt;​&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Contribution from PRIPARE.&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:WG5_N94_PRIPARE_Contribution_SP_Priv_engineer_frmwk_v2.pdf http://ipen.trialog.com/wiki/File:WG5_N94_PRIPARE_Contribution_SP_Priv_engineer_frmwk_v2.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
*Presentation in Jaipur October 2015&lt;br /&gt;
**Summary made to PRIPARE project:&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:Status_SP_Privacy_Engineering_Framework_October_30th_2015.pdf http://ipen.trialog.com/wiki/File:Status_SP_Privacy_Engineering_Framework_October_30th_2015.pdf]&lt;br /&gt;
*Contribution in 2016 with liaison to be established with ISO/IEC JTC1/SC7&amp;amp;nbsp;Software and systems engineering&lt;br /&gt;
**Contribution made by PRIPARE&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:SP_Privacy_Engineering_Framework_Report_Tampa.pdf http://ipen.trialog.com/wiki/File:SP_Privacy_Engineering_Framework_Report_Tampa.pdf]&lt;br /&gt;
*Presentation in Tampa April 2016&lt;br /&gt;
*Study period completed&lt;br /&gt;
*Followed by ISO/IEC 27550: Privacy engineering, see above&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy-Preserving Attribute-based Entity Authentication (Started in October 2015. Completed in April 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leader&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Pascal Pailler, Nat Sakimura, Jaz Hoon Nah&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Initiated in Jaipur (Oct 2015)&lt;br /&gt;
*Replaces SP privacy-respecting identity management scheme using attribute-based credentials&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;(outcome of the ABC4trust FP7 project:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://abc4trust.eu/ https://abc4trust.eu]&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;,, initiated in April 2014 in Hong Kong), with an extended scope&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Completed.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Followed by new project&amp;amp;nbsp;: ISO/IEC 27551: Requirements for attribute-based unlinkable entity authentication (see above)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;PII Protection considerations for smartphone app providers (Started in October 2015. Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leader&lt;br /&gt;
| Rahul Sharma, Natarajan Swaminathan, Johan Eksteen, Sai Pradeep Chilukuri&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study mobile application ecosystems from a privacy viewpoint&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collect views of multiple stakeholders in the mobile applications space&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collect mobile apps privacy guidelines issued by various agencies&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collate a report on the findings&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Potentially provide a new work item proposal&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Jaipur (October 2015)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy in smart cities (Started in October 2015. Completed in November 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Sanjeev Chhabra, Udbhav Tiwari&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Connect with multiple stakeholders in the smart city space&lt;br /&gt;
&lt;br /&gt;
Refer the existing work on smart cities&lt;br /&gt;
&lt;br /&gt;
Collate information, feedback, inputs from the stakeholders and draft the guidelines&lt;br /&gt;
&lt;br /&gt;
Potentially provide (a) new work item proposal(s) that can translate in guidelines&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Jaipur (October 2015)&lt;br /&gt;
&lt;br /&gt;
Liaison to be established with ISO/IEC JTC1/SG1 (Smart cities)&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Presentation in Tampa (April 2016) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Liaison with EIP-SCC mentioned (see&amp;amp;nbsp;[https://eu-smartcities.eu/content/citizen-centric-approach-data-privacy-design https://eu-smartcities.eu/content/citizen-centric-approach-data-privacy-design]).&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Presentation in Abu Dhabi (October 2016) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Includes contribution from pripare:&amp;amp;nbsp;[https://eu-smartcities.eu/sites/all/files/PRIPARE%20recommendations%20for%20Smart%20cities.pdf https://eu-smartcities.eu/sites/all/files/PRIPARE%20recommendations%20for%20Smart%20cities.pdf]&lt;br /&gt;
&lt;br /&gt;
Presentation in Hamilton (April 2017) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Includes contribution from pripare&amp;amp;nbsp;[https://ipen.trialog.com/wiki/File:PRIPARE_contribution_to_SP_Privacy_in_Smart_Cities_2017.pdf https://ipen.trialog.com/wiki/File:PRIPARE_contribution_to_SP_Privacy_in_Smart_Cities_2017.pdf]&lt;br /&gt;
*Liaison to take place with ISO/IEC WG11 Smart cities in order to discuss the needs for privacy management guidelines&lt;br /&gt;
&lt;br /&gt;
Proposal for new work item in Berlin (Nov 2017)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2016 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Editorial inconsistencies to 29100 (Started in April 2016. Completed in October 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Nat Sakimura, Mathias Reinis, Elaine Newton&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Collecting errors and correcting inconsistencies&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Completed, has led to a draft amendment (with limited scope)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Guidelines for privacy in Internet of Things (IoT) (Started in April 2016. Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px; line-height: 20.8px;&amp;quot;&amp;gt;Heung Youl Youm,&amp;amp;nbsp;Srinivas Poorsala, Antonio Kung&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
*assess the viability of producing guidelines for Privacy in IoT within WG5;&lt;br /&gt;
*to potentially provide (a) New Work Item Proposal(s) and/or input material for existing relevant projects as a recommendation to the Working Groups 5 depending on the outcome of this assessmen&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Tampa (April 2016)&lt;br /&gt;
&lt;br /&gt;
Initial contribution in Abu Dhabi (October 2016)&lt;br /&gt;
&lt;br /&gt;
Conclusions in Hamilton (April 2017) led to the merging with Guidelines fot security in IoT (WG4). See new study period below on security and privacy for Internet of things.&lt;br /&gt;
&lt;br /&gt;
Discussion also led to a new study period &amp;quot;Framework of user-centric PII handling based on privacy preference management by users&amp;quot;&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Code of practice solution for different types of PII (Started in October 2016, Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;font face=&amp;quot;sans-serif&amp;quot; color=&amp;quot;#252525&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 14px;&amp;quot;&amp;gt;Mathias Reinis,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;Heung Youl Youm&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study ISO/IEC FDIS 29151 and ISO/IEC IS 27018 with the objective to find a solution that is applicable for different types of PII processors, especially compatible with the needs of a SME&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Terminated due to lack of contributions&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2017 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Guidelines for security and privacy for Internet of Things (IoT) (Started in April 2017 - Completed in November 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Start/Duration&lt;br /&gt;
| April 2017/6 months)&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Eric Hibbard, Faud Khan, Tyson Macaulay, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| prepare the materials necessary to initiate an International Standard&amp;lt;br/&amp;gt;coming out of the SC 27 meeting in Berlin (Oct-2017)&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is an SC27/WG4 study periods involving WG4 and WG5.&lt;br /&gt;
&lt;br /&gt;
Study period is completed and new work item has been proposed ([https://ipen.trialog.com/wiki/ISO#New_Work_Item_Proposal_Security_and_Privacy_for_the_Internet_of_Things https://ipen.trialog.com/wiki/ISO#New_Work_Item_Proposal_Security_and_Privacy_for_the_Internet_of_Things]).&lt;br /&gt;
&lt;br /&gt;
Kickoff expected in Wuhan in WG4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Requirements and outline for ISO/IEC 29115 revision (Started in April 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| David Temoshok replacing Sal Francomacaro, Thomas Lenz, Patrick Curry, Andrew Hugues, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Has resulted in a NWIP&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Application of ISO 31000 for identify-related risk (Started in April 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Christophe Stenuit, Joanne Knight&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Gather information in order to determine the viability of creating a standard providing guidance on the application of ISO 31000:2009 to assess identity-related risks&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| New work item proposal&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Identify assurance framework (Started in April 2017. Completed in October 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Patrick Curry, Anthony Nadalin&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| analyze the outcomes of ISO/IEC 29003 and related matters, then to determine the possible next&amp;amp;nbsp;steps towards developing an International Standard (or other mechanisms) for an Identity Assurance&amp;amp;nbsp;Framework.&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Framework of user-centric PII handling based on privacy preference management by users (Started in April 2017, Completed in October 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Start/duration&lt;br /&gt;
| &lt;br /&gt;
April 2017 / 18 months&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Shinzaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| define frameworks of user-centric PII handling based on privacy preferences of users&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Triggered by an initiative from ITU-T for such a framework applied to the IoT. See&amp;amp;nbsp;[https://ipen.trialog.com/wiki/ITU_Activities#X.iotsec-3:.C2.A0Technical_framework_of_PII_.28Personally_Identifiable_Information.29_handling_system_in_IoT_environment https://ipen.trialog.com/wiki/ITU_Activities#X.iotsec-3:.C2.A0Technical_framework_of_PII_.28Personally_Identifiable_Information.29_handling_system_in_IoT_environment]&lt;br /&gt;
&lt;br /&gt;
In Berlin (November 2017),&amp;amp;nbsp; it was decided to consider 3 options&lt;br /&gt;
&lt;br /&gt;
*extension of 29101&lt;br /&gt;
*definition of a generic model&lt;br /&gt;
*defintion of specific models&lt;br /&gt;
&lt;br /&gt;
In Wuhan (May 2018), it was decided to prepare a NWIP&lt;br /&gt;
&lt;br /&gt;
In Gjovik (October 2018), the NWIP was finalised&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Concept of PII Deletion (Started in November 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Volker Hammer, Srinivas Poosarla, Eduard de Jong, Alan Shipman&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study the potential internationalisation of national standard DIN 66398 &amp;quot;Guideline for development of a concept for data deletion with derivation of deletion periods for personal identifiable information&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2018 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== Development of Identify standards landscape standing document (&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in&amp;amp;nbsp; April 2018, Completed in October 2018)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Joanne Knight, Julien Bringer, Salvatore Francomacaro, Heung Youl Youm,&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Create an initial draft of a new SD that would provide:&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;The scope of the identity standards landscape&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;font-family: Symbol; margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Introductory content identifying the role of each existing and emerging standard within the landscape, as well as its relationship to the other landscape standards. To serve as an overarching guide to users of identity-related standards&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;A process (flow chart) for the analysis of the creation or revision of identity standards, to guide alignment&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;font-family: Symbol; margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;A register of alignment issues that have been accepted as needing to be resolve&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Develop a proposal for the process of maintaining the standing document that includes:&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Additional Privacy-Enhancing Data De-identification standards (Started in April 2018. Completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Malcom Townsend, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span lang=&amp;quot;EN-GB&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; color=&amp;quot;#000000&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;This Study Period aims to analyze the challenges and risks associated with the implementation of data de-identification techniques described in ISO 20889, and provide a strategy and structured approach to the potential development of additional standards covering such potential topics such as requirements, risk analysis, codes of practice and so on.&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Privacy consideration in practical workflows&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;April 2018, completed in April 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Mickey Cohen&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to collect contributions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-US&amp;quot;&amp;gt;(1) On workflows describing&amp;amp;nbsp;'''use-cases'''&amp;amp;nbsp;where the combination of privacy, security (including exposure period), identification quality and practical implementation need to be viewed as a whole&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span lang=&amp;quot;EN-US&amp;quot;&amp;gt;(2) For a merit function(s) combining the subjects into a qualitative evaluation of the privacy&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Identity Standards Landscape Document Update (&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in October 2018. Completed in October 2019)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Andrew Hughes,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Christophe Stenuit,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Kai Rannenberg&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;''S''&amp;lt;/font&amp;gt;olicit additional content for the draft Standing Document; solicit comments on the current content and structure of the draft Standing Document; discuss and make a disposition of comments; and to update the Standing Document&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Use case for identity assurance&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;October 2018, completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Andrew Hughes,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Tony Nadalin,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Patrick Curry&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
To compile a set of business use cases that require identity assurance, which can be analysed to produce functional requirements for identity assurance.&amp;amp;nbsp; These functional requirements can inform the review of TS 29003 and the contents of a potential Identity Assurance Framework International Standard, and also inform the evolution of ISO/IEC 29115&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 13px;&amp;quot;&amp;gt;Impact of Artificial Intelligence on Privacy (&amp;lt;/span&amp;gt;&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in October 2018, Completed in September 2020)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Srinivas Poosarla,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Peter Dickman,&amp;amp;nbsp;Gurshabad Grover, Peter Deussen, Heung Your Youm,&amp;amp;nbsp;&amp;lt;/span&amp;gt;Zhao Yunwei&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Establish a 12-month study period starting in October 2018 to review the emerging field of AI and assess its potential impact on privacy, and task the rapporteurs of the Study Period&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*to review the new generation of AI-based systems (autonomous systems) and identify their impact on privacy,&lt;br /&gt;
*to review the new threats to privacy which AI can create,&lt;br /&gt;
*to review how AI can be used by deploying improved privacy controls, and&lt;br /&gt;
*to provide recommendations for standardization work.&lt;br /&gt;
&lt;br /&gt;
Is extended for 6 months to study TR 24030 AI use cases and to check the impact of AI on ISO/IEC 27701&lt;br /&gt;
&lt;br /&gt;
Is further extended 6 months to study the integration of security&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
In addition to specific contributions made by SC27 experts, the Intermediate report uses the following references:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
IEEE Ethically Aligned AI&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://standards.ieee.org/industry-connections/ec/autonomous-systems.html https://standards.ieee.org/industry-connections/ec/autonomous-systems.html]&amp;amp;nbsp;[https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead_v2.pdf https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead_v2.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Ethics guidelines for trustworthy AI&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=57112 https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=57112]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Privacy Commissioners declaration&amp;amp;nbsp;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://icdppc.org/wp-content/uploads/2018/10/20180922_ICDPPC-40th_AI-Declaration_ADOPTED.pdf https://icdppc.org/wp-content/uploads/2018/10/20180922_ICDPPC-40th_AI-Declaration_ADOPTED.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| AI as a Disruptive Opportunity and Challenge for Security&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://docbox.etsi.org/Workshop/2018/201806_ETSISECURITYWEEK/IoTSecurity/S03_TRANSFORMATION/TRIALOG_KUNG.pdf https://docbox.etsi.org/Workshop/2018/201806_ETSISECURITYWEEK/IoTSecurity/S03_TRANSFORMATION/TRIALOG_KUNG.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| The impact of AI on life cycle processes&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20190121/Documents/2_%20Antonio%20Kung_v2.pdf https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20190121/Documents/2_%20Antonio%20Kung_v2.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Asilomar principles&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://futureoflife.org/ai-principles https://futureoflife.org/ai-principles]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Malicious AI report&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://img1.wsimg.com/blobby/go/3d82daa4-97fe-4096-9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf&amp;amp;nbsp https://img1.wsimg.com/blobby/go/3d82daa4-97fe-4096-9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf&amp;amp;amp;nbsp];&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Privacy and Freedom of Expression In the Age of Artificial Intelligence&amp;amp;nbsp;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://privacyinternational.org/report/1752/privacy-and-freedom-expression-age-artificial-intelligence https://privacyinternational.org/report/1752/privacy-and-freedom-expression-age-artificial-intelligence]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| UK House of Lords Select Committee on AI: AI in the UK: ready, willing and able?&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Australian Human Rights Commission report on Human Rights and Technology&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://tech.humanrights.gov.au/sites/default/files/2019-02/AHRC_WEF_AI_WhitePaper2019.pdf https://tech.humanrights.gov.au/sites/default/files/2019-02/AHRC_WEF_AI_WhitePaper2019.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Expected to have a strong collaboration with JTC1/SC42 Artificial Intelligence&lt;br /&gt;
&lt;br /&gt;
An intermediate report was provided in Tel-Aviv (April 2019).&lt;br /&gt;
&lt;br /&gt;
A second report was provided in Paris (October 2019)&lt;br /&gt;
&lt;br /&gt;
A third report was provided in the virtual meeting (April 2020) including the study of SC42 ISO/IEC 24030 on AI use cases and the study of ISO/IEC 27701&lt;br /&gt;
&lt;br /&gt;
A fourth report was provide in the virtual meeting (Sep 2020) including a contribution to TC215 on security and privacy in eHealth. A preliminary work item is started&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2019 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Review of requirements for accredited certification for sector specific ISMS standards (S&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;tarted in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;April 2019. Completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Hans Hedbom, Alan Shipman&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to review possible approaches to establishing the foundation for accredited certification for sector-specific standards. The concrete instantiation for this is ISO/IEC 27552, which is expected to be published soon.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Consent receipts and records&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;April 2019, completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Collin Wallis, Andrew Hughes&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to assess the need for a Consent Receipt and Record standard used to support transparency and accountability practices related to an individual's consent to PII processing&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy engineering model&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;April 2019, Completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study period to evaluate the development of a privacy engineering model intended to support privacy engineers, privacy architects and other practitioners as a bridge between ISO/IEC SC27 and other data privacy management standards and the technical and business process services and functionality needed to integrate data privacy control requirements in operational processes, systems and their ecosystems&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
As a result of this study period, a NWIP - Privacy operationalisation model and method for engineering has been established&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Guidance on processes of a privacy information management system (&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Started in October 2019, Completed in September 2020))&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michael Steiner, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Determine if SC 27 needs a standard for “Guidance on processes of a privacy information management system” as part of the ISO /IEC 27000-family.&lt;br /&gt;
&lt;br /&gt;
Consider the following:&lt;br /&gt;
&amp;lt;ol style=&amp;quot;list-style-type: lower-roman;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001 and ISO/IEC 27003&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27701 (a.k.a. DIS 27552)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO Handbook “The integrated use of management system standards”&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 33004&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt;&amp;amp;nbsp;WD of ISO/IEC 27022&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Privacy for Fintech services&amp;amp;nbsp;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;(Started in October 2019, completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Heung Youl Youm, Gurshabad Grover, Janssen Esguerra&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Objectives&lt;br /&gt;
&lt;br /&gt;
*Apply privacy principles described in ISO/IEC 29100:2011&lt;br /&gt;
*Study use cases, applications, devices and underlying infrastructure related to providing Fintech services&lt;br /&gt;
*Consider privacy risks related to providing Fintech services&lt;br /&gt;
*Consider regulatory requirements that impact privacy of customers&lt;br /&gt;
*Consider all kinds of stakeholders: regulators, financial institutions, customers, product suppliers, application and service providers&lt;br /&gt;
*Study the necessity for guidelines on privacy where it could be used by relevant stakeholders to mitigate risks identified in the privacy risks assessment&lt;br /&gt;
&lt;br /&gt;
Protection of privacy of customers is a concern as a huge amount of PII is collected, transmitted, shared, used and analyzed at every instance in the interconnected Fintech services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2020 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 5181 Information technology - Security and privacy - Data provenance (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Ryan Ko, Jan de Meer, Yi Zhang&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Proposed Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information called meta-data, from sources, intermediaries and users creating, manipulating, and transforming data.&lt;br /&gt;
&lt;br /&gt;
The meta-data derived from data creations and transformations serves for earning trust in entities and stakeholders during the whole lifecycle of data use and data manipulations. By referring to provenance meta-data an information respectively a decision base is provided to processes or, to individuals. Provenance meta-data of data records can also be applied from both, processes, or individuals when they have to decide which one of their data, they want to make voluntarily available to the public as a common good and which one not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
1st report Nov 2020&lt;br /&gt;
&lt;br /&gt;
2nd report March 2021&lt;br /&gt;
&lt;br /&gt;
3rd report May 2021&lt;br /&gt;
&lt;br /&gt;
4th report Oct 2021&lt;br /&gt;
&lt;br /&gt;
5th report Feb 2022&lt;br /&gt;
&lt;br /&gt;
6th report April 2021&lt;br /&gt;
&lt;br /&gt;
7th report July 2022&lt;br /&gt;
&lt;br /&gt;
Draft for proposed new project September 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 6089 Impact of Artificial Intelligence on Security and Privacy (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
'''Phase 1 (completed):''' Antonio Kung,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Srinivas Poosarla,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Peter Dickman,&amp;amp;nbsp;Gurshabad Grover, Peter Deussen, Heung Your Youm,&amp;amp;nbsp;&amp;lt;/span&amp;gt;Zhao Yunwei, Volker Smoljko&lt;br /&gt;
&lt;br /&gt;
'''Phase 2 (completed):''' Antonio Kung, Lenora Zimmerman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
'''Phase 1 (completed): '''The PWI has the objective to investigate the possibility to propose one or several documents&lt;br /&gt;
&lt;br /&gt;
*Part 1: a TR providing&lt;br /&gt;
**guidance on how to assess the impact of security and privacy of AI use cases,&lt;br /&gt;
**providing a security and privacy analysis of the use cases in ISO/IEC TR 24030 (AI use cases)&lt;br /&gt;
*Part 2: a TS providing&lt;br /&gt;
**an overview of privacy concerns for AI,&lt;br /&gt;
**guidance concerning AI-based systems&lt;br /&gt;
**additional recommendations concerning standards where appropriate&lt;br /&gt;
*Part 3: a TS providing&lt;br /&gt;
**an overview of security concerns for AI,&lt;br /&gt;
**guidance concerning AI-based systems&lt;br /&gt;
**additional recommendations concerning standards where appropriate&lt;br /&gt;
&lt;br /&gt;
The following work will be carried out in the PWI:&lt;br /&gt;
&lt;br /&gt;
*extend the content of the study period report with the following&lt;br /&gt;
**analysis of TR 24030 use cases from a security viewpoint,&lt;br /&gt;
**identification of standards for which specific recommendations concerning AI would be useful,&lt;br /&gt;
**identification of AI standards for which specific recommendations concerning security and privacy would be useful;&lt;br /&gt;
**identification of specific security controls; and&lt;br /&gt;
**whatever contributions that matches the intended content of part 1, part 2, and part 3.&lt;br /&gt;
*transform the report into a set of three documents that can be submitted as draft TR and TS;&lt;br /&gt;
*make a recommendation on the way to proceed concerning the three documents;&lt;br /&gt;
&lt;br /&gt;
'''Phase 2 (completed):&amp;amp;nbsp;'''Guidance on addressing privacy protection for artificial intelligence systems&lt;br /&gt;
&lt;br /&gt;
*Currently discussed scope:&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to identify and address privacy concerns in the development and use of artificial intelligence systems. The guidance in this document aims to provide information to organizations to help them better understand and address the impact of AI systems and Machine Learning techniques on individual privacy and society at-large. This document also addresses ways in which societal and regulatory expectations influence how AI systems and Machine Learning is and is not used.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use AI systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
1st PWI report was published in April 2021.&lt;br /&gt;
&lt;br /&gt;
2nd PWI report was published in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is the continuation of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Impact_of_Artificial_Intelligence_on_Privacy_.28Started_in_October_2018.2C_Completed_in_September_2020.29 study period] that concluded in September 2020&lt;br /&gt;
&lt;br /&gt;
Further to the completion of phase 1, part 1 is registered as a TR (ISO/IEC 27653; Impact of security and privacy in AI use cases), part 2 is still-on going. Note that part 3 has been transferred to another PWI 7699 (Guidance for addressing security threats and failures in artificial&amp;lt;br/&amp;gt;intelligence)&lt;br /&gt;
&lt;br /&gt;
Further to March 2022 meeting, PWI is working on making a new work item proposal on Guidance for privacy protection in AI systems&lt;br /&gt;
Further to October 2022 meeting, a ballot has been initiative for ISO/IEC 27091 Cybersecurity and data protection - Artificial intelligence - Privacy Protection&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 6102 Guidance on illustrative processes of a privacy information management system (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michael Steiner, Vishnu Kanhere&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Determine if SC 27 needs a standard for “Guidance on processes of a privacy information management system” as part of the ISO /IEC 27000-family.&lt;br /&gt;
&lt;br /&gt;
Consider the following:&lt;br /&gt;
&amp;lt;ol style=&amp;quot;list-style-type: lower-roman;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001 and ISO/IEC 27003&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27701 (a.k.a. DIS 27552)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO Handbook “The integrated use of management system standards”&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 33004&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt;&amp;amp;nbsp;WD of ISO/IEC 27022&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was cancelled because of lack of progress&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021 and completed in October 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2021 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7748 Guidance and practices for privacy preservation based on zero-knowledge proofs (Started in April 2021, completed in October 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This work item is to provide guidance and best practices for privacy preservation based on zeroknowledge proofs, taking into account normative references and comparing specifically with ISO/IEC 27551, 27556 and 29191. It intends to cover the usage of zero-knowledge proof protocols for privacy preservation and PII protection in a wide range of data processing applications. It takes into account using zero knowledge proof based privacy-preserving verification system architectures, data process flows and module interfaces.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed, transformed into a NWIP 27565&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7732 Age verification (Started in April 2021, completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study the possibility to submit a new work item&lt;br /&gt;
&lt;br /&gt;
*Age Verification Systems –Part 1: Framework, Levels of Assurance and Privacy Protection&lt;br /&gt;
*Age Verification Systems –Part 2: Conformity Assessment&lt;br /&gt;
*Age Verification Systems –Part 3: Interoperability&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and transformed into project proposal 27566&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 27045 Big data security and privacy - guidelines for data security management framework&amp;amp;nbsp;(Started in April 2021, completed in April 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Xiaoyuan Bai - Hongru Zhu - Vicky Hailey - Shiqi Li - Liu Dapeng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a data security management framework that helps organizations to build the data security capabilities in the context of big data including guidelines to develop security measures.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all organizations, regardless of type, size or nature, that develop or use big data systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/63929.html https://www.iso.org/standard/63929.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st PWI was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Is a WG4 project. An initial projects was started in October 2018 on processes with a different scope:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*1st WD was provided in January 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*2nd WD was provided in April 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*3rd WD was provided in October 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*4th WD was provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*5th WD was provided in November 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*6th WG was provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*Project was restarted as a PWI in April 2021 with a new scope&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It seems that the project will focus on security only&lt;br /&gt;
*1st PWI provided in May 2022&lt;br /&gt;
*2nd PWI provided in March 2023&lt;br /&gt;
*3rd PWI provided in October 2023&lt;br /&gt;
*NP in February 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27564 Privacy models (Started in October 2021, completed in April 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Yod Samuel Martin, Antonio Kung, Jonathan Fox, Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Scope: PWI will study the value of specifying and maintaining privacy models&lt;br /&gt;
&lt;br /&gt;
Tasks:&lt;br /&gt;
&lt;br /&gt;
*Study use cases, e.g., connected vehicles, data spaces&lt;br /&gt;
*Define models of interest, e.g., protection models, engineering models, ecosystem models.&lt;br /&gt;
*Provide guidance on the lifecycle of models. Take into account ISO/IEC/IEEE 24641 (MBSSE), and liaise with SC7&lt;br /&gt;
*Provide guidance for the design of models ensuring a common vision with different viewpoints: citizen, policy, governance, compliance, engineering&lt;br /&gt;
*Explain the relationship with other standards; SC7, SC27, SC41, SC42, PC317…&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
completed and transformed into project prposal TS 27564&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2022 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27568 Security and privacy of digital twins (Started in October 2022 completed in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Srinivas Poosarla, Heung Youl Youm, Mark Lizar, Vitor Jesus, Vishnu Kanhere, Patrick Curry, Karim Tobich&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
The PWI will monitor the progress in standardisation work on digital twins and investigate stakeholders concerns on the security and privacy of digital twins.&lt;br /&gt;
&lt;br /&gt;
A call for contributions will circulated to SC 27/WG 5, and liaison will take place with SC41. A report and recommendation for further work will be prepared for discussion in the next meeting.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*A first report was provided at the April 2023 meeting.&lt;br /&gt;
*A second report was provided at the October 2023 meeting.&lt;br /&gt;
*A third report was provided at the April 2024 meeting.&lt;br /&gt;
*A proposal for a NP was provided at the March 2025 meeting.&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and transformed in TS 27568 Proposal&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2023 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27046&amp;amp;nbsp;Big data security and privacy&amp;amp;nbsp;- Implementation guidelines (restarted in April 2023)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Le Yu, Victoria Hailey, Jinghua Min&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This proposal aims to analyze challenges and risks of big data security and privacy, and proposes guidelines for implmentation of big data secuirty and privacy in aspects of big data resources, and organizing, distributing, computing and destroying big data&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78572.html https://www.iso.org/standard/78572.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in October 2019&lt;br /&gt;
*2nd WD was provided in June 2020&lt;br /&gt;
*3rd WD was provided in November 2020&lt;br /&gt;
*4th WD was provided in April 2021&lt;br /&gt;
*5th WD was provided in April 2022&lt;br /&gt;
*1st CD was provided in October 2022&lt;br /&gt;
*Further to April 2023 meeting, this project will be reverted to preliminary work item (PWI)&lt;br /&gt;
*Project cancelled in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27566 IS Age assurance - Part 2: Interoperability, technical architecture and guidelines for use (started in November 2023)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines for interoperability, technical architecture and use of age assurance&lt;br /&gt;
systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in November 2023&lt;br /&gt;
*1st PWI text provided in December 2023&lt;br /&gt;
*2nd PWI text provided in March 2024&lt;br /&gt;
*NP voted on September 2024&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Completed in September 2024 and replaced by a work item&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2024 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27569 Personal identifiable information (PII) processing record information structure (Started in April 2024, completed in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Jan Lindquist&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording&lt;br /&gt;
information relevant to the processing of Personally Identifiable Information (PII). This document further&lt;br /&gt;
provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
*provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
*provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
*exchange of PII processing information i.e. information on how PII is processed between information&lt;br /&gt;
systems; and,&lt;br /&gt;
*management of the lifecycle of PII processing as based in the use of specific lawful basis.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*A first report was provided at the October 2024&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and led to 2nd edition of ISO/IEC 27560&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27573 Privacy protection of user avatar and system avatar interactions in the metaverse (Started in October 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
The necessity for a section on considerations regarding personal information in Metaverse standards and Specifications is emphasized. This is due to the direct impact on personal information by PII (Personally Identifiable Information) or related data subject information identification mechanisms.&lt;br /&gt;
&lt;br /&gt;
MSPA (Meta Standard Privacy Assessment) is utilized as a methodology for evaluating the impact on personal information, reviewing the necessity of introducing privacy protection or controls by assessing privacy protection requirements and potential threats in standards or specifications.&lt;br /&gt;
&lt;br /&gt;
This process also aids in analyzing and documenting potential damages that may occur to individuals.&lt;br /&gt;
&lt;br /&gt;
This document contains a framework for protecting personal information during interactions between user avatars and system avatars in the Metaverse. It shall specify the requirements for:&lt;br /&gt;
&lt;br /&gt;
*categorizing and managing the information generated and used by user avatars and system avatars;&lt;br /&gt;
*protecting the privacy of user avatars and personal data in the Metaverse.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Started in April 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Report provided in September 2029&lt;br /&gt;
*Second report provided in March 2025 with a proposal for a new project 27573 and a new PWI Privacy in metaverse frameworks&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27574 Privacy in brain-computer interface (BCI) applications (started in October 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This standard provides requirements and guidelines on privacy for Brain Computer Interface&lt;br /&gt;
Applications. It provides privacy controls specific to Brain Computer Interface Applications&lt;br /&gt;
to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC&lt;br /&gt;
27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Started in April 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Proposal for study in April 2024&lt;br /&gt;
*Report provided in September 2024&lt;br /&gt;
*NWIP proposal provided in February 2025&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Completed_study_periods_and_pwis&amp;diff=2204</id>
		<title>Completed study periods and pwis</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Completed_study_periods_and_pwis&amp;diff=2204"/>
		<updated>2026-03-15T21:53:14Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2015 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy engineering framework (Started in April 2015. Completed in April 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Matthias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study the concept of privacy engineering and see whether new work items are needed&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Slides presenting motivation for study period by Antonio Kung:&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:PRIPARE_Proposal_Study_Period_Privacy_Engineering_Framework_2.pdf http://ipen.trialog.com/wiki/File:PRIPARE_Proposal_Study_Period_Privacy_Engineering_Framework_2.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Timeline&lt;br /&gt;
| &amp;lt;div style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;&lt;br /&gt;
*Contributions by August 15th 2015.&lt;br /&gt;
**&amp;lt;span style=&amp;quot;line-height: 20.8px; background-color: rgb(255, 255, 0);&amp;quot;&amp;gt;​&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Contribution from PRIPARE.&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:WG5_N94_PRIPARE_Contribution_SP_Priv_engineer_frmwk_v2.pdf http://ipen.trialog.com/wiki/File:WG5_N94_PRIPARE_Contribution_SP_Priv_engineer_frmwk_v2.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
*Presentation in Jaipur October 2015&lt;br /&gt;
**Summary made to PRIPARE project:&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:Status_SP_Privacy_Engineering_Framework_October_30th_2015.pdf http://ipen.trialog.com/wiki/File:Status_SP_Privacy_Engineering_Framework_October_30th_2015.pdf]&lt;br /&gt;
*Contribution in 2016 with liaison to be established with ISO/IEC JTC1/SC7&amp;amp;nbsp;Software and systems engineering&lt;br /&gt;
**Contribution made by PRIPARE&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:SP_Privacy_Engineering_Framework_Report_Tampa.pdf http://ipen.trialog.com/wiki/File:SP_Privacy_Engineering_Framework_Report_Tampa.pdf]&lt;br /&gt;
*Presentation in Tampa April 2016&lt;br /&gt;
*Study period completed&lt;br /&gt;
*Followed by ISO/IEC 27550: Privacy engineering, see above&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy-Preserving Attribute-based Entity Authentication (Started in October 2015. Completed in April 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leader&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Pascal Pailler, Nat Sakimura, Jaz Hoon Nah&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Initiated in Jaipur (Oct 2015)&lt;br /&gt;
*Replaces SP privacy-respecting identity management scheme using attribute-based credentials&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;(outcome of the ABC4trust FP7 project:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://abc4trust.eu/ https://abc4trust.eu]&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;,, initiated in April 2014 in Hong Kong), with an extended scope&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Completed.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Followed by new project&amp;amp;nbsp;: ISO/IEC 27551: Requirements for attribute-based unlinkable entity authentication (see above)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;PII Protection considerations for smartphone app providers (Started in October 2015. Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leader&lt;br /&gt;
| Rahul Sharma, Natarajan Swaminathan, Johan Eksteen, Sai Pradeep Chilukuri&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study mobile application ecosystems from a privacy viewpoint&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collect views of multiple stakeholders in the mobile applications space&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collect mobile apps privacy guidelines issued by various agencies&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collate a report on the findings&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Potentially provide a new work item proposal&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Jaipur (October 2015)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy in smart cities (Started in October 2015. Completed in November 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Sanjeev Chhabra, Udbhav Tiwari&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Connect with multiple stakeholders in the smart city space&lt;br /&gt;
&lt;br /&gt;
Refer the existing work on smart cities&lt;br /&gt;
&lt;br /&gt;
Collate information, feedback, inputs from the stakeholders and draft the guidelines&lt;br /&gt;
&lt;br /&gt;
Potentially provide (a) new work item proposal(s) that can translate in guidelines&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Jaipur (October 2015)&lt;br /&gt;
&lt;br /&gt;
Liaison to be established with ISO/IEC JTC1/SG1 (Smart cities)&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Presentation in Tampa (April 2016) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Liaison with EIP-SCC mentioned (see&amp;amp;nbsp;[https://eu-smartcities.eu/content/citizen-centric-approach-data-privacy-design https://eu-smartcities.eu/content/citizen-centric-approach-data-privacy-design]).&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Presentation in Abu Dhabi (October 2016) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Includes contribution from pripare:&amp;amp;nbsp;[https://eu-smartcities.eu/sites/all/files/PRIPARE%20recommendations%20for%20Smart%20cities.pdf https://eu-smartcities.eu/sites/all/files/PRIPARE%20recommendations%20for%20Smart%20cities.pdf]&lt;br /&gt;
&lt;br /&gt;
Presentation in Hamilton (April 2017) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Includes contribution from pripare&amp;amp;nbsp;[https://ipen.trialog.com/wiki/File:PRIPARE_contribution_to_SP_Privacy_in_Smart_Cities_2017.pdf https://ipen.trialog.com/wiki/File:PRIPARE_contribution_to_SP_Privacy_in_Smart_Cities_2017.pdf]&lt;br /&gt;
*Liaison to take place with ISO/IEC WG11 Smart cities in order to discuss the needs for privacy management guidelines&lt;br /&gt;
&lt;br /&gt;
Proposal for new work item in Berlin (Nov 2017)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2016 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Editorial inconsistencies to 29100 (Started in April 2016. Completed in October 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Nat Sakimura, Mathias Reinis, Elaine Newton&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Collecting errors and correcting inconsistencies&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Completed, has led to a draft amendment (with limited scope)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Guidelines for privacy in Internet of Things (IoT) (Started in April 2016. Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px; line-height: 20.8px;&amp;quot;&amp;gt;Heung Youl Youm,&amp;amp;nbsp;Srinivas Poorsala, Antonio Kung&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
*assess the viability of producing guidelines for Privacy in IoT within WG5;&lt;br /&gt;
*to potentially provide (a) New Work Item Proposal(s) and/or input material for existing relevant projects as a recommendation to the Working Groups 5 depending on the outcome of this assessmen&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Tampa (April 2016)&lt;br /&gt;
&lt;br /&gt;
Initial contribution in Abu Dhabi (October 2016)&lt;br /&gt;
&lt;br /&gt;
Conclusions in Hamilton (April 2017) led to the merging with Guidelines fot security in IoT (WG4). See new study period below on security and privacy for Internet of things.&lt;br /&gt;
&lt;br /&gt;
Discussion also led to a new study period &amp;quot;Framework of user-centric PII handling based on privacy preference management by users&amp;quot;&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Code of practice solution for different types of PII (Started in October 2016, Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;font face=&amp;quot;sans-serif&amp;quot; color=&amp;quot;#252525&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 14px;&amp;quot;&amp;gt;Mathias Reinis,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;Heung Youl Youm&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study ISO/IEC FDIS 29151 and ISO/IEC IS 27018 with the objective to find a solution that is applicable for different types of PII processors, especially compatible with the needs of a SME&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Terminated due to lack of contributions&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2017 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Guidelines for security and privacy for Internet of Things (IoT) (Started in April 2017 - Completed in November 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Start/Duration&lt;br /&gt;
| April 2017/6 months)&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Eric Hibbard, Faud Khan, Tyson Macaulay, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| prepare the materials necessary to initiate an International Standard&amp;lt;br/&amp;gt;coming out of the SC 27 meeting in Berlin (Oct-2017)&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is an SC27/WG4 study periods involving WG4 and WG5.&lt;br /&gt;
&lt;br /&gt;
Study period is completed and new work item has been proposed ([https://ipen.trialog.com/wiki/ISO#New_Work_Item_Proposal_Security_and_Privacy_for_the_Internet_of_Things https://ipen.trialog.com/wiki/ISO#New_Work_Item_Proposal_Security_and_Privacy_for_the_Internet_of_Things]).&lt;br /&gt;
&lt;br /&gt;
Kickoff expected in Wuhan in WG4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Requirements and outline for ISO/IEC 29115 revision (Started in April 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| David Temoshok replacing Sal Francomacaro, Thomas Lenz, Patrick Curry, Andrew Hugues, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Has resulted in a NWIP&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Application of ISO 31000 for identify-related risk (Started in April 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Christophe Stenuit, Joanne Knight&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Gather information in order to determine the viability of creating a standard providing guidance on the application of ISO 31000:2009 to assess identity-related risks&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| New work item proposal&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Identify assurance framework (Started in April 2017. Completed in October 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Patrick Curry, Anthony Nadalin&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| analyze the outcomes of ISO/IEC 29003 and related matters, then to determine the possible next&amp;amp;nbsp;steps towards developing an International Standard (or other mechanisms) for an Identity Assurance&amp;amp;nbsp;Framework.&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Framework of user-centric PII handling based on privacy preference management by users (Started in April 2017, Completed in October 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Start/duration&lt;br /&gt;
| &lt;br /&gt;
April 2017 / 18 months&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Shinzaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| define frameworks of user-centric PII handling based on privacy preferences of users&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Triggered by an initiative from ITU-T for such a framework applied to the IoT. See&amp;amp;nbsp;[https://ipen.trialog.com/wiki/ITU_Activities#X.iotsec-3:.C2.A0Technical_framework_of_PII_.28Personally_Identifiable_Information.29_handling_system_in_IoT_environment https://ipen.trialog.com/wiki/ITU_Activities#X.iotsec-3:.C2.A0Technical_framework_of_PII_.28Personally_Identifiable_Information.29_handling_system_in_IoT_environment]&lt;br /&gt;
&lt;br /&gt;
In Berlin (November 2017),&amp;amp;nbsp; it was decided to consider 3 options&lt;br /&gt;
&lt;br /&gt;
*extension of 29101&lt;br /&gt;
*definition of a generic model&lt;br /&gt;
*defintion of specific models&lt;br /&gt;
&lt;br /&gt;
In Wuhan (May 2018), it was decided to prepare a NWIP&lt;br /&gt;
&lt;br /&gt;
In Gjovik (October 2018), the NWIP was finalised&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Concept of PII Deletion (Started in November 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Volker Hammer, Srinivas Poosarla, Eduard de Jong, Alan Shipman&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study the potential internationalisation of national standard DIN 66398 &amp;quot;Guideline for development of a concept for data deletion with derivation of deletion periods for personal identifiable information&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2018 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== Development of Identify standards landscape standing document (&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in&amp;amp;nbsp; April 2018, Completed in October 2018)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Joanne Knight, Julien Bringer, Salvatore Francomacaro, Heung Youl Youm,&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Create an initial draft of a new SD that would provide:&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;The scope of the identity standards landscape&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;font-family: Symbol; margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Introductory content identifying the role of each existing and emerging standard within the landscape, as well as its relationship to the other landscape standards. To serve as an overarching guide to users of identity-related standards&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;A process (flow chart) for the analysis of the creation or revision of identity standards, to guide alignment&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;font-family: Symbol; margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;A register of alignment issues that have been accepted as needing to be resolve&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Develop a proposal for the process of maintaining the standing document that includes:&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Additional Privacy-Enhancing Data De-identification standards (Started in April 2018. Completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Malcom Townsend, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span lang=&amp;quot;EN-GB&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; color=&amp;quot;#000000&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;This Study Period aims to analyze the challenges and risks associated with the implementation of data de-identification techniques described in ISO 20889, and provide a strategy and structured approach to the potential development of additional standards covering such potential topics such as requirements, risk analysis, codes of practice and so on.&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Privacy consideration in practical workflows&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;April 2018, completed in April 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Mickey Cohen&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to collect contributions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-US&amp;quot;&amp;gt;(1) On workflows describing&amp;amp;nbsp;'''use-cases'''&amp;amp;nbsp;where the combination of privacy, security (including exposure period), identification quality and practical implementation need to be viewed as a whole&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span lang=&amp;quot;EN-US&amp;quot;&amp;gt;(2) For a merit function(s) combining the subjects into a qualitative evaluation of the privacy&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Identity Standards Landscape Document Update (&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in October 2018. Completed in October 2019)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Andrew Hughes,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Christophe Stenuit,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Kai Rannenberg&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;''S''&amp;lt;/font&amp;gt;olicit additional content for the draft Standing Document; solicit comments on the current content and structure of the draft Standing Document; discuss and make a disposition of comments; and to update the Standing Document&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Use case for identity assurance&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;October 2018, completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Andrew Hughes,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Tony Nadalin,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Patrick Curry&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
To compile a set of business use cases that require identity assurance, which can be analysed to produce functional requirements for identity assurance.&amp;amp;nbsp; These functional requirements can inform the review of TS 29003 and the contents of a potential Identity Assurance Framework International Standard, and also inform the evolution of ISO/IEC 29115&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 13px;&amp;quot;&amp;gt;Impact of Artificial Intelligence on Privacy (&amp;lt;/span&amp;gt;&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in October 2018, Completed in September 2020)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Srinivas Poosarla,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Peter Dickman,&amp;amp;nbsp;Gurshabad Grover, Peter Deussen, Heung Your Youm,&amp;amp;nbsp;&amp;lt;/span&amp;gt;Zhao Yunwei&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Establish a 12-month study period starting in October 2018 to review the emerging field of AI and assess its potential impact on privacy, and task the rapporteurs of the Study Period&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*to review the new generation of AI-based systems (autonomous systems) and identify their impact on privacy,&lt;br /&gt;
*to review the new threats to privacy which AI can create,&lt;br /&gt;
*to review how AI can be used by deploying improved privacy controls, and&lt;br /&gt;
*to provide recommendations for standardization work.&lt;br /&gt;
&lt;br /&gt;
Is extended for 6 months to study TR 24030 AI use cases and to check the impact of AI on ISO/IEC 27701&lt;br /&gt;
&lt;br /&gt;
Is further extended 6 months to study the integration of security&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
In addition to specific contributions made by SC27 experts, the Intermediate report uses the following references:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
IEEE Ethically Aligned AI&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://standards.ieee.org/industry-connections/ec/autonomous-systems.html https://standards.ieee.org/industry-connections/ec/autonomous-systems.html]&amp;amp;nbsp;[https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead_v2.pdf https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead_v2.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Ethics guidelines for trustworthy AI&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=57112 https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=57112]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Privacy Commissioners declaration&amp;amp;nbsp;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://icdppc.org/wp-content/uploads/2018/10/20180922_ICDPPC-40th_AI-Declaration_ADOPTED.pdf https://icdppc.org/wp-content/uploads/2018/10/20180922_ICDPPC-40th_AI-Declaration_ADOPTED.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| AI as a Disruptive Opportunity and Challenge for Security&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://docbox.etsi.org/Workshop/2018/201806_ETSISECURITYWEEK/IoTSecurity/S03_TRANSFORMATION/TRIALOG_KUNG.pdf https://docbox.etsi.org/Workshop/2018/201806_ETSISECURITYWEEK/IoTSecurity/S03_TRANSFORMATION/TRIALOG_KUNG.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| The impact of AI on life cycle processes&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20190121/Documents/2_%20Antonio%20Kung_v2.pdf https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20190121/Documents/2_%20Antonio%20Kung_v2.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Asilomar principles&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://futureoflife.org/ai-principles https://futureoflife.org/ai-principles]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Malicious AI report&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://img1.wsimg.com/blobby/go/3d82daa4-97fe-4096-9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf&amp;amp;nbsp https://img1.wsimg.com/blobby/go/3d82daa4-97fe-4096-9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf&amp;amp;amp;nbsp];&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Privacy and Freedom of Expression In the Age of Artificial Intelligence&amp;amp;nbsp;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://privacyinternational.org/report/1752/privacy-and-freedom-expression-age-artificial-intelligence https://privacyinternational.org/report/1752/privacy-and-freedom-expression-age-artificial-intelligence]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| UK House of Lords Select Committee on AI: AI in the UK: ready, willing and able?&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Australian Human Rights Commission report on Human Rights and Technology&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://tech.humanrights.gov.au/sites/default/files/2019-02/AHRC_WEF_AI_WhitePaper2019.pdf https://tech.humanrights.gov.au/sites/default/files/2019-02/AHRC_WEF_AI_WhitePaper2019.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Expected to have a strong collaboration with JTC1/SC42 Artificial Intelligence&lt;br /&gt;
&lt;br /&gt;
An intermediate report was provided in Tel-Aviv (April 2019).&lt;br /&gt;
&lt;br /&gt;
A second report was provided in Paris (October 2019)&lt;br /&gt;
&lt;br /&gt;
A third report was provided in the virtual meeting (April 2020) including the study of SC42 ISO/IEC 24030 on AI use cases and the study of ISO/IEC 27701&lt;br /&gt;
&lt;br /&gt;
A fourth report was provide in the virtual meeting (Sep 2020) including a contribution to TC215 on security and privacy in eHealth. A preliminary work item is started&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2019 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Review of requirements for accredited certification for sector specific ISMS standards (S&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;tarted in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;April 2019. Completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Hans Hedbom, Alan Shipman&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to review possible approaches to establishing the foundation for accredited certification for sector-specific standards. The concrete instantiation for this is ISO/IEC 27552, which is expected to be published soon.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Consent receipts and records&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;April 2019, completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Collin Wallis, Andrew Hughes&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to assess the need for a Consent Receipt and Record standard used to support transparency and accountability practices related to an individual's consent to PII processing&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy engineering model&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;April 2019, Completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study period to evaluate the development of a privacy engineering model intended to support privacy engineers, privacy architects and other practitioners as a bridge between ISO/IEC SC27 and other data privacy management standards and the technical and business process services and functionality needed to integrate data privacy control requirements in operational processes, systems and their ecosystems&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
As a result of this study period, a NWIP - Privacy operationalisation model and method for engineering has been established&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Guidance on processes of a privacy information management system (&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Started in October 2019, Completed in September 2020))&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michael Steiner, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Determine if SC 27 needs a standard for “Guidance on processes of a privacy information management system” as part of the ISO /IEC 27000-family.&lt;br /&gt;
&lt;br /&gt;
Consider the following:&lt;br /&gt;
&amp;lt;ol style=&amp;quot;list-style-type: lower-roman;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001 and ISO/IEC 27003&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27701 (a.k.a. DIS 27552)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO Handbook “The integrated use of management system standards”&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 33004&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt;&amp;amp;nbsp;WD of ISO/IEC 27022&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Privacy for Fintech services&amp;amp;nbsp;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;(Started in October 2019, completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Heung Youl Youm, Gurshabad Grover, Janssen Esguerra&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Objectives&lt;br /&gt;
&lt;br /&gt;
*Apply privacy principles described in ISO/IEC 29100:2011&lt;br /&gt;
*Study use cases, applications, devices and underlying infrastructure related to providing Fintech services&lt;br /&gt;
*Consider privacy risks related to providing Fintech services&lt;br /&gt;
*Consider regulatory requirements that impact privacy of customers&lt;br /&gt;
*Consider all kinds of stakeholders: regulators, financial institutions, customers, product suppliers, application and service providers&lt;br /&gt;
*Study the necessity for guidelines on privacy where it could be used by relevant stakeholders to mitigate risks identified in the privacy risks assessment&lt;br /&gt;
&lt;br /&gt;
Protection of privacy of customers is a concern as a huge amount of PII is collected, transmitted, shared, used and analyzed at every instance in the interconnected Fintech services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2020 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 5181 Information technology - Security and privacy - Data provenance (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Ryan Ko, Jan de Meer, Yi Zhang&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Proposed Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information called meta-data, from sources, intermediaries and users creating, manipulating, and transforming data.&lt;br /&gt;
&lt;br /&gt;
The meta-data derived from data creations and transformations serves for earning trust in entities and stakeholders during the whole lifecycle of data use and data manipulations. By referring to provenance meta-data an information respectively a decision base is provided to processes or, to individuals. Provenance meta-data of data records can also be applied from both, processes, or individuals when they have to decide which one of their data, they want to make voluntarily available to the public as a common good and which one not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
1st report Nov 2020&lt;br /&gt;
&lt;br /&gt;
2nd report March 2021&lt;br /&gt;
&lt;br /&gt;
3rd report May 2021&lt;br /&gt;
&lt;br /&gt;
4th report Oct 2021&lt;br /&gt;
&lt;br /&gt;
5th report Feb 2022&lt;br /&gt;
&lt;br /&gt;
6th report April 2021&lt;br /&gt;
&lt;br /&gt;
7th report July 2022&lt;br /&gt;
&lt;br /&gt;
Draft for proposed new project September 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 6089 Impact of Artificial Intelligence on Security and Privacy (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
'''Phase 1 (completed):''' Antonio Kung,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Srinivas Poosarla,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Peter Dickman,&amp;amp;nbsp;Gurshabad Grover, Peter Deussen, Heung Your Youm,&amp;amp;nbsp;&amp;lt;/span&amp;gt;Zhao Yunwei, Volker Smoljko&lt;br /&gt;
&lt;br /&gt;
'''Phase 2 (completed):''' Antonio Kung, Lenora Zimmerman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
'''Phase 1 (completed): '''The PWI has the objective to investigate the possibility to propose one or several documents&lt;br /&gt;
&lt;br /&gt;
*Part 1: a TR providing&lt;br /&gt;
**guidance on how to assess the impact of security and privacy of AI use cases,&lt;br /&gt;
**providing a security and privacy analysis of the use cases in ISO/IEC TR 24030 (AI use cases)&lt;br /&gt;
*Part 2: a TS providing&lt;br /&gt;
**an overview of privacy concerns for AI,&lt;br /&gt;
**guidance concerning AI-based systems&lt;br /&gt;
**additional recommendations concerning standards where appropriate&lt;br /&gt;
*Part 3: a TS providing&lt;br /&gt;
**an overview of security concerns for AI,&lt;br /&gt;
**guidance concerning AI-based systems&lt;br /&gt;
**additional recommendations concerning standards where appropriate&lt;br /&gt;
&lt;br /&gt;
The following work will be carried out in the PWI:&lt;br /&gt;
&lt;br /&gt;
*extend the content of the study period report with the following&lt;br /&gt;
**analysis of TR 24030 use cases from a security viewpoint,&lt;br /&gt;
**identification of standards for which specific recommendations concerning AI would be useful,&lt;br /&gt;
**identification of AI standards for which specific recommendations concerning security and privacy would be useful;&lt;br /&gt;
**identification of specific security controls; and&lt;br /&gt;
**whatever contributions that matches the intended content of part 1, part 2, and part 3.&lt;br /&gt;
*transform the report into a set of three documents that can be submitted as draft TR and TS;&lt;br /&gt;
*make a recommendation on the way to proceed concerning the three documents;&lt;br /&gt;
&lt;br /&gt;
'''Phase 2 (completed):&amp;amp;nbsp;'''Guidance on addressing privacy protection for artificial intelligence systems&lt;br /&gt;
&lt;br /&gt;
*Currently discussed scope:&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to identify and address privacy concerns in the development and use of artificial intelligence systems. The guidance in this document aims to provide information to organizations to help them better understand and address the impact of AI systems and Machine Learning techniques on individual privacy and society at-large. This document also addresses ways in which societal and regulatory expectations influence how AI systems and Machine Learning is and is not used.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use AI systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
1st PWI report was published in April 2021.&lt;br /&gt;
&lt;br /&gt;
2nd PWI report was published in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is the continuation of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Impact_of_Artificial_Intelligence_on_Privacy_.28Started_in_October_2018.2C_Completed_in_September_2020.29 study period] that concluded in September 2020&lt;br /&gt;
&lt;br /&gt;
Further to the completion of phase 1, part 1 is registered as a TR (ISO/IEC 27653; Impact of security and privacy in AI use cases), part 2 is still-on going. Note that part 3 has been transferred to another PWI 7699 (Guidance for addressing security threats and failures in artificial&amp;lt;br/&amp;gt;intelligence)&lt;br /&gt;
&lt;br /&gt;
Further to March 2022 meeting, PWI is working on making a new work item proposal on Guidance for privacy protection in AI systems&lt;br /&gt;
Further to October 2022 meeting, a ballot has been initiative for ISO/IEC 27091 Cybersecurity and data protection - Artificial intelligence - Privacy Protection&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 6102 Guidance on illustrative processes of a privacy information management system (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michael Steiner, Vishnu Kanhere&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Determine if SC 27 needs a standard for “Guidance on processes of a privacy information management system” as part of the ISO /IEC 27000-family.&lt;br /&gt;
&lt;br /&gt;
Consider the following:&lt;br /&gt;
&amp;lt;ol style=&amp;quot;list-style-type: lower-roman;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001 and ISO/IEC 27003&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27701 (a.k.a. DIS 27552)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO Handbook “The integrated use of management system standards”&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 33004&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt;&amp;amp;nbsp;WD of ISO/IEC 27022&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was cancelled because of lack of progress&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021 and completed in October 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2021 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7748 Guidance and practices for privacy preservation based on zero-knowledge proofs (Started in April 2021, completed in October 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This work item is to provide guidance and best practices for privacy preservation based on zeroknowledge proofs, taking into account normative references and comparing specifically with ISO/IEC 27551, 27556 and 29191. It intends to cover the usage of zero-knowledge proof protocols for privacy preservation and PII protection in a wide range of data processing applications. It takes into account using zero knowledge proof based privacy-preserving verification system architectures, data process flows and module interfaces.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed, transformed into a NWIP 27565&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7732 Age verification (Started in April 2021, completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study the possibility to submit a new work item&lt;br /&gt;
&lt;br /&gt;
*Age Verification Systems –Part 1: Framework, Levels of Assurance and Privacy Protection&lt;br /&gt;
*Age Verification Systems –Part 2: Conformity Assessment&lt;br /&gt;
*Age Verification Systems –Part 3: Interoperability&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and transformed into project proposal 27566&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 27045 Big data security and privacy - guidelines for data security management framework&amp;amp;nbsp;(Started in April 2021, completed in April 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Xiaoyuan Bai - Hongru Zhu - Vicky Hailey - Shiqi Li - Liu Dapeng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a data security management framework that helps organizations to build the data security capabilities in the context of big data including guidelines to develop security measures.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all organizations, regardless of type, size or nature, that develop or use big data systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/63929.html https://www.iso.org/standard/63929.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st PWI was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Is a WG4 project. An initial projects was started in October 2018 on processes with a different scope:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*1st WD was provided in January 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*2nd WD was provided in April 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*3rd WD was provided in October 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*4th WD was provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*5th WD was provided in November 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*6th WG was provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*Project was restarted as a PWI in April 2021 with a new scope&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It seems that the project will focus on security only&lt;br /&gt;
*1st PWI provided in May 2022&lt;br /&gt;
*2nd PWI provided in March 2023&lt;br /&gt;
*3rd PWI provided in October 2023&lt;br /&gt;
*NP in February 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27564 Privacy models (Started in October 2021, completed in April 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Yod Samuel Martin, Antonio Kung, Jonathan Fox, Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Scope: PWI will study the value of specifying and maintaining privacy models&lt;br /&gt;
&lt;br /&gt;
Tasks:&lt;br /&gt;
&lt;br /&gt;
*Study use cases, e.g., connected vehicles, data spaces&lt;br /&gt;
*Define models of interest, e.g., protection models, engineering models, ecosystem models.&lt;br /&gt;
*Provide guidance on the lifecycle of models. Take into account ISO/IEC/IEEE 24641 (MBSSE), and liaise with SC7&lt;br /&gt;
*Provide guidance for the design of models ensuring a common vision with different viewpoints: citizen, policy, governance, compliance, engineering&lt;br /&gt;
*Explain the relationship with other standards; SC7, SC27, SC41, SC42, PC317…&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
completed and transformed into project prposal TS 27564&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2022 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27568 Security and privacy of digital twins (Started in October 2022 completed in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Srinivas Poosarla, Heung Youl Youm, Mark Lizar, Vitor Jesus, Vishnu Kanhere, Patrick Curry, Karim Tobich&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
The PWI will monitor the progress in standardisation work on digital twins and investigate stakeholders concerns on the security and privacy of digital twins.&lt;br /&gt;
&lt;br /&gt;
A call for contributions will circulated to SC 27/WG 5, and liaison will take place with SC41. A report and recommendation for further work will be prepared for discussion in the next meeting.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*A first report was provided at the April 2023 meeting.&lt;br /&gt;
*A second report was provided at the October 2023 meeting.&lt;br /&gt;
*A third report was provided at the April 2024 meeting.&lt;br /&gt;
*A proposal for a NP was provided at the March 2025 meeting.&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and transformed in TS 27568 Proposal&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2023 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27046&amp;amp;nbsp;Big data security and privacy&amp;amp;nbsp;- Implementation guidelines (restarted in April 2023)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Le Yu, Victoria Hailey, Jinghua Min&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This proposal aims to analyze challenges and risks of big data security and privacy, and proposes guidelines for implmentation of big data secuirty and privacy in aspects of big data resources, and organizing, distributing, computing and destroying big data&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78572.html https://www.iso.org/standard/78572.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in October 2019&lt;br /&gt;
*2nd WD was provided in June 2020&lt;br /&gt;
*3rd WD was provided in November 2020&lt;br /&gt;
*4th WD was provided in April 2021&lt;br /&gt;
*5th WD was provided in April 2022&lt;br /&gt;
*1st CD was provided in October 2022&lt;br /&gt;
*Further to April 2023 meeting, this project will be reverted to preliminary work item (PWI)&lt;br /&gt;
*Project cancelled in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27566 IS Age assurance - Part 2: Interoperability, technical architecture and guidelines for use (started in November 2023)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines for interoperability, technical architecture and use of age assurance&lt;br /&gt;
systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in November 2023&lt;br /&gt;
*1st PWI text provided in December 2023&lt;br /&gt;
*2nd PWI text provided in March 2024&lt;br /&gt;
*NP voted on September 2024&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Completed in September 2024 and replaced by a work item&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2024 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27569 Personal identifiable information (PII) processing record information structure (Started in April 2024, completed in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Jan Lindquist&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording&lt;br /&gt;
information relevant to the processing of Personally Identifiable Information (PII). This document further&lt;br /&gt;
provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
*provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
*provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
*exchange of PII processing information i.e. information on how PII is processed between information&lt;br /&gt;
systems; and,&lt;br /&gt;
*management of the lifecycle of PII processing as based in the use of specific lawful basis.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*A first report was provided at the October 2024&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and led to 2nd edition of ISO/IEC 27560&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27573 Privacy protection of user avatar and system avatar interactions in the metaverse (Started in October 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
The necessity for a section on considerations regarding personal information in Metaverse standards and Specifications is emphasized. This is due to the direct impact on personal information by PII (Personally Identifiable Information) or related data subject information identification mechanisms.&lt;br /&gt;
&lt;br /&gt;
MSPA (Meta Standard Privacy Assessment) is utilized as a methodology for evaluating the impact on personal information, reviewing the necessity of introducing privacy protection or controls by assessing privacy protection requirements and potential threats in standards or specifications.&lt;br /&gt;
&lt;br /&gt;
This process also aids in analyzing and documenting potential damages that may occur to individuals.&lt;br /&gt;
&lt;br /&gt;
This document contains a framework for protecting personal information during interactions between user avatars and system avatars in the Metaverse. It shall specify the requirements for:&lt;br /&gt;
&lt;br /&gt;
*categorizing and managing the information generated and used by user avatars and system avatars;&lt;br /&gt;
*protecting the privacy of user avatars and personal data in the Metaverse.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Started in April 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Report provided in September 2029&lt;br /&gt;
*Second report provided in March 2025 with a proposal for a new project 27573 and a new PWI Privacy in metaverse frameworks&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27574 Privacy in brain-computer interface (BCI) applications (started in October 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This standard provides requirements and guidelines on privacy for Brain Computer Interface&lt;br /&gt;
Applications. It provides privacy controls specific to Brain Computer Interface Applications&lt;br /&gt;
to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC&lt;br /&gt;
27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Started in April 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Proposal for study in April 2024&lt;br /&gt;
*Report provided in September 2024&lt;br /&gt;
*NWIP proposal provided in February 2025&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Completed_study_periods_and_pwis&amp;diff=2203</id>
		<title>Completed study periods and pwis</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Completed_study_periods_and_pwis&amp;diff=2203"/>
		<updated>2026-03-15T21:52:40Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Started in 2021 and completed */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2015 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy engineering framework (Started in April 2015. Completed in April 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Matthias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study the concept of privacy engineering and see whether new work items are needed&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Slides presenting motivation for study period by Antonio Kung:&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:PRIPARE_Proposal_Study_Period_Privacy_Engineering_Framework_2.pdf http://ipen.trialog.com/wiki/File:PRIPARE_Proposal_Study_Period_Privacy_Engineering_Framework_2.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Timeline&lt;br /&gt;
| &amp;lt;div style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;&lt;br /&gt;
*Contributions by August 15th 2015.&lt;br /&gt;
**&amp;lt;span style=&amp;quot;line-height: 20.8px; background-color: rgb(255, 255, 0);&amp;quot;&amp;gt;​&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Contribution from PRIPARE.&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:WG5_N94_PRIPARE_Contribution_SP_Priv_engineer_frmwk_v2.pdf http://ipen.trialog.com/wiki/File:WG5_N94_PRIPARE_Contribution_SP_Priv_engineer_frmwk_v2.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
*Presentation in Jaipur October 2015&lt;br /&gt;
**Summary made to PRIPARE project:&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:Status_SP_Privacy_Engineering_Framework_October_30th_2015.pdf http://ipen.trialog.com/wiki/File:Status_SP_Privacy_Engineering_Framework_October_30th_2015.pdf]&lt;br /&gt;
*Contribution in 2016 with liaison to be established with ISO/IEC JTC1/SC7&amp;amp;nbsp;Software and systems engineering&lt;br /&gt;
**Contribution made by PRIPARE&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:SP_Privacy_Engineering_Framework_Report_Tampa.pdf http://ipen.trialog.com/wiki/File:SP_Privacy_Engineering_Framework_Report_Tampa.pdf]&lt;br /&gt;
*Presentation in Tampa April 2016&lt;br /&gt;
*Study period completed&lt;br /&gt;
*Followed by ISO/IEC 27550: Privacy engineering, see above&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy-Preserving Attribute-based Entity Authentication (Started in October 2015. Completed in April 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leader&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Pascal Pailler, Nat Sakimura, Jaz Hoon Nah&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Initiated in Jaipur (Oct 2015)&lt;br /&gt;
*Replaces SP privacy-respecting identity management scheme using attribute-based credentials&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;(outcome of the ABC4trust FP7 project:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://abc4trust.eu/ https://abc4trust.eu]&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;,, initiated in April 2014 in Hong Kong), with an extended scope&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Completed.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Followed by new project&amp;amp;nbsp;: ISO/IEC 27551: Requirements for attribute-based unlinkable entity authentication (see above)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;PII Protection considerations for smartphone app providers (Started in October 2015. Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leader&lt;br /&gt;
| Rahul Sharma, Natarajan Swaminathan, Johan Eksteen, Sai Pradeep Chilukuri&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study mobile application ecosystems from a privacy viewpoint&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collect views of multiple stakeholders in the mobile applications space&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collect mobile apps privacy guidelines issued by various agencies&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Collate a report on the findings&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Potentially provide a new work item proposal&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Jaipur (October 2015)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy in smart cities (Started in October 2015. Completed in November 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Sanjeev Chhabra, Udbhav Tiwari&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Connect with multiple stakeholders in the smart city space&lt;br /&gt;
&lt;br /&gt;
Refer the existing work on smart cities&lt;br /&gt;
&lt;br /&gt;
Collate information, feedback, inputs from the stakeholders and draft the guidelines&lt;br /&gt;
&lt;br /&gt;
Potentially provide (a) new work item proposal(s) that can translate in guidelines&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Jaipur (October 2015)&lt;br /&gt;
&lt;br /&gt;
Liaison to be established with ISO/IEC JTC1/SG1 (Smart cities)&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Presentation in Tampa (April 2016) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Liaison with EIP-SCC mentioned (see&amp;amp;nbsp;[https://eu-smartcities.eu/content/citizen-centric-approach-data-privacy-design https://eu-smartcities.eu/content/citizen-centric-approach-data-privacy-design]).&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Presentation in Abu Dhabi (October 2016) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Includes contribution from pripare:&amp;amp;nbsp;[https://eu-smartcities.eu/sites/all/files/PRIPARE%20recommendations%20for%20Smart%20cities.pdf https://eu-smartcities.eu/sites/all/files/PRIPARE%20recommendations%20for%20Smart%20cities.pdf]&lt;br /&gt;
&lt;br /&gt;
Presentation in Hamilton (April 2017) of intermediate state&lt;br /&gt;
&lt;br /&gt;
*Includes contribution from pripare&amp;amp;nbsp;[https://ipen.trialog.com/wiki/File:PRIPARE_contribution_to_SP_Privacy_in_Smart_Cities_2017.pdf https://ipen.trialog.com/wiki/File:PRIPARE_contribution_to_SP_Privacy_in_Smart_Cities_2017.pdf]&lt;br /&gt;
*Liaison to take place with ISO/IEC WG11 Smart cities in order to discuss the needs for privacy management guidelines&lt;br /&gt;
&lt;br /&gt;
Proposal for new work item in Berlin (Nov 2017)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2016 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Editorial inconsistencies to 29100 (Started in April 2016. Completed in October 2016)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Nat Sakimura, Mathias Reinis, Elaine Newton&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Collecting errors and correcting inconsistencies&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Completed, has led to a draft amendment (with limited scope)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Guidelines for privacy in Internet of Things (IoT) (Started in April 2016. Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px; line-height: 20.8px;&amp;quot;&amp;gt;Heung Youl Youm,&amp;amp;nbsp;Srinivas Poorsala, Antonio Kung&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
*assess the viability of producing guidelines for Privacy in IoT within WG5;&lt;br /&gt;
*to potentially provide (a) New Work Item Proposal(s) and/or input material for existing relevant projects as a recommendation to the Working Groups 5 depending on the outcome of this assessmen&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Initiated in Tampa (April 2016)&lt;br /&gt;
&lt;br /&gt;
Initial contribution in Abu Dhabi (October 2016)&lt;br /&gt;
&lt;br /&gt;
Conclusions in Hamilton (April 2017) led to the merging with Guidelines fot security in IoT (WG4). See new study period below on security and privacy for Internet of things.&lt;br /&gt;
&lt;br /&gt;
Discussion also led to a new study period &amp;quot;Framework of user-centric PII handling based on privacy preference management by users&amp;quot;&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Code of practice solution for different types of PII (Started in October 2016, Completed in April 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &amp;lt;font face=&amp;quot;sans-serif&amp;quot; color=&amp;quot;#252525&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 14px;&amp;quot;&amp;gt;Mathias Reinis,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;Heung Youl Youm&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study ISO/IEC FDIS 29151 and ISO/IEC IS 27018 with the objective to find a solution that is applicable for different types of PII processors, especially compatible with the needs of a SME&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Terminated due to lack of contributions&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2017 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Guidelines for security and privacy for Internet of Things (IoT) (Started in April 2017 - Completed in November 2017)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Start/Duration&lt;br /&gt;
| April 2017/6 months)&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Eric Hibbard, Faud Khan, Tyson Macaulay, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| prepare the materials necessary to initiate an International Standard&amp;lt;br/&amp;gt;coming out of the SC 27 meeting in Berlin (Oct-2017)&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is an SC27/WG4 study periods involving WG4 and WG5.&lt;br /&gt;
&lt;br /&gt;
Study period is completed and new work item has been proposed ([https://ipen.trialog.com/wiki/ISO#New_Work_Item_Proposal_Security_and_Privacy_for_the_Internet_of_Things https://ipen.trialog.com/wiki/ISO#New_Work_Item_Proposal_Security_and_Privacy_for_the_Internet_of_Things]).&lt;br /&gt;
&lt;br /&gt;
Kickoff expected in Wuhan in WG4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Requirements and outline for ISO/IEC 29115 revision (Started in April 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| David Temoshok replacing Sal Francomacaro, Thomas Lenz, Patrick Curry, Andrew Hugues, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Has resulted in a NWIP&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Application of ISO 31000 for identify-related risk (Started in April 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Christophe Stenuit, Joanne Knight&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Gather information in order to determine the viability of creating a standard providing guidance on the application of ISO 31000:2009 to assess identity-related risks&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| New work item proposal&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Identify assurance framework (Started in April 2017. Completed in October 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Patrick Curry, Anthony Nadalin&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| analyze the outcomes of ISO/IEC 29003 and related matters, then to determine the possible next&amp;amp;nbsp;steps towards developing an International Standard (or other mechanisms) for an Identity Assurance&amp;amp;nbsp;Framework.&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Framework of user-centric PII handling based on privacy preference management by users (Started in April 2017, Completed in October 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Start/duration&lt;br /&gt;
| &lt;br /&gt;
April 2017 / 18 months&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Shinzaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| define frameworks of user-centric PII handling based on privacy preferences of users&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Triggered by an initiative from ITU-T for such a framework applied to the IoT. See&amp;amp;nbsp;[https://ipen.trialog.com/wiki/ITU_Activities#X.iotsec-3:.C2.A0Technical_framework_of_PII_.28Personally_Identifiable_Information.29_handling_system_in_IoT_environment https://ipen.trialog.com/wiki/ITU_Activities#X.iotsec-3:.C2.A0Technical_framework_of_PII_.28Personally_Identifiable_Information.29_handling_system_in_IoT_environment]&lt;br /&gt;
&lt;br /&gt;
In Berlin (November 2017),&amp;amp;nbsp; it was decided to consider 3 options&lt;br /&gt;
&lt;br /&gt;
*extension of 29101&lt;br /&gt;
*definition of a generic model&lt;br /&gt;
*defintion of specific models&lt;br /&gt;
&lt;br /&gt;
In Wuhan (May 2018), it was decided to prepare a NWIP&lt;br /&gt;
&lt;br /&gt;
In Gjovik (October 2018), the NWIP was finalised&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Concept of PII Deletion (Started in November 2017. Completed in April 2018)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Volker Hammer, Srinivas Poosarla, Eduard de Jong, Alan Shipman&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study the potential internationalisation of national standard DIN 66398 &amp;quot;Guideline for development of a concept for data deletion with derivation of deletion periods for personal identifiable information&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2018 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== Development of Identify standards landscape standing document (&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in&amp;amp;nbsp; April 2018, Completed in October 2018)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Joanne Knight, Julien Bringer, Salvatore Francomacaro, Heung Youl Youm,&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Create an initial draft of a new SD that would provide:&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;The scope of the identity standards landscape&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;font-family: Symbol; margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Introductory content identifying the role of each existing and emerging standard within the landscape, as well as its relationship to the other landscape standards. To serve as an overarching guide to users of identity-related standards&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;A process (flow chart) for the analysis of the creation or revision of identity standards, to guide alignment&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;font-family: Symbol; margin: 0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;A register of alignment issues that have been accepted as needing to be resolve&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
*&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-NZ&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;Develop a proposal for the process of maintaining the standing document that includes:&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Additional Privacy-Enhancing Data De-identification standards (Started in April 2018. Completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Malcom Townsend, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span lang=&amp;quot;EN-GB&amp;quot; style=&amp;quot;margin: 0px;&amp;quot;&amp;gt;&amp;lt;font face=&amp;quot;Calibri&amp;quot; color=&amp;quot;#000000&amp;quot; size=&amp;quot;3&amp;quot;&amp;gt;This Study Period aims to analyze the challenges and risks associated with the implementation of data de-identification techniques described in ISO 20889, and provide a strategy and structured approach to the potential development of additional standards covering such potential topics such as requirements, risk analysis, codes of practice and so on.&amp;lt;/font&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Privacy consideration in practical workflows&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;April 2018, completed in April 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Mickey Cohen&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to collect contributions:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;span lang=&amp;quot;EN-US&amp;quot;&amp;gt;(1) On workflows describing&amp;amp;nbsp;'''use-cases'''&amp;amp;nbsp;where the combination of privacy, security (including exposure period), identification quality and practical implementation need to be viewed as a whole&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span lang=&amp;quot;EN-US&amp;quot;&amp;gt;(2) For a merit function(s) combining the subjects into a qualitative evaluation of the privacy&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Identity Standards Landscape Document Update (&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in October 2018. Completed in October 2019)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Andrew Hughes,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Christophe Stenuit,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Kai Rannenberg&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;''S''&amp;lt;/font&amp;gt;olicit additional content for the draft Standing Document; solicit comments on the current content and structure of the draft Standing Document; discuss and make a disposition of comments; and to update the Standing Document&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Use case for identity assurance&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;October 2018, completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Andrew Hughes,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Tony Nadalin,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Patrick Curry&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
To compile a set of business use cases that require identity assurance, which can be analysed to produce functional requirements for identity assurance.&amp;amp;nbsp; These functional requirements can inform the review of TS 29003 and the contents of a potential Identity Assurance Framework International Standard, and also inform the evolution of ISO/IEC 29115&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 13px;&amp;quot;&amp;gt;Impact of Artificial Intelligence on Privacy (&amp;lt;/span&amp;gt;&amp;lt;font size=&amp;quot;3&amp;quot; style=&amp;quot;line-height: 19.2px;&amp;quot;&amp;gt;Started in October 2018, Completed in September 2020)&amp;lt;/font&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Srinivas Poosarla,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Peter Dickman,&amp;amp;nbsp;Gurshabad Grover, Peter Deussen, Heung Your Youm,&amp;amp;nbsp;&amp;lt;/span&amp;gt;Zhao Yunwei&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Establish a 12-month study period starting in October 2018 to review the emerging field of AI and assess its potential impact on privacy, and task the rapporteurs of the Study Period&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*to review the new generation of AI-based systems (autonomous systems) and identify their impact on privacy,&lt;br /&gt;
*to review the new threats to privacy which AI can create,&lt;br /&gt;
*to review how AI can be used by deploying improved privacy controls, and&lt;br /&gt;
*to provide recommendations for standardization work.&lt;br /&gt;
&lt;br /&gt;
Is extended for 6 months to study TR 24030 AI use cases and to check the impact of AI on ISO/IEC 27701&lt;br /&gt;
&lt;br /&gt;
Is further extended 6 months to study the integration of security&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
In addition to specific contributions made by SC27 experts, the Intermediate report uses the following references:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
IEEE Ethically Aligned AI&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://standards.ieee.org/industry-connections/ec/autonomous-systems.html https://standards.ieee.org/industry-connections/ec/autonomous-systems.html]&amp;amp;nbsp;[https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead_v2.pdf https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead_v2.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Ethics guidelines for trustworthy AI&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=57112 https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=57112]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Privacy Commissioners declaration&amp;amp;nbsp;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://icdppc.org/wp-content/uploads/2018/10/20180922_ICDPPC-40th_AI-Declaration_ADOPTED.pdf https://icdppc.org/wp-content/uploads/2018/10/20180922_ICDPPC-40th_AI-Declaration_ADOPTED.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| AI as a Disruptive Opportunity and Challenge for Security&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://docbox.etsi.org/Workshop/2018/201806_ETSISECURITYWEEK/IoTSecurity/S03_TRANSFORMATION/TRIALOG_KUNG.pdf https://docbox.etsi.org/Workshop/2018/201806_ETSISECURITYWEEK/IoTSecurity/S03_TRANSFORMATION/TRIALOG_KUNG.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| The impact of AI on life cycle processes&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20190121/Documents/2_%20Antonio%20Kung_v2.pdf https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20190121/Documents/2_%20Antonio%20Kung_v2.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Asilomar principles&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://futureoflife.org/ai-principles https://futureoflife.org/ai-principles]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Malicious AI report&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://img1.wsimg.com/blobby/go/3d82daa4-97fe-4096-9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf&amp;amp;nbsp https://img1.wsimg.com/blobby/go/3d82daa4-97fe-4096-9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf&amp;amp;amp;nbsp];&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Privacy and Freedom of Expression In the Age of Artificial Intelligence&amp;amp;nbsp;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://privacyinternational.org/report/1752/privacy-and-freedom-expression-age-artificial-intelligence https://privacyinternational.org/report/1752/privacy-and-freedom-expression-age-artificial-intelligence]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| UK House of Lords Select Committee on AI: AI in the UK: ready, willing and able?&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/100.pdf]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Australian Human Rights Commission report on Human Rights and Technology&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: xx-small;&amp;quot;&amp;gt;[https://tech.humanrights.gov.au/sites/default/files/2019-02/AHRC_WEF_AI_WhitePaper2019.pdf https://tech.humanrights.gov.au/sites/default/files/2019-02/AHRC_WEF_AI_WhitePaper2019.pdf]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Expected to have a strong collaboration with JTC1/SC42 Artificial Intelligence&lt;br /&gt;
&lt;br /&gt;
An intermediate report was provided in Tel-Aviv (April 2019).&lt;br /&gt;
&lt;br /&gt;
A second report was provided in Paris (October 2019)&lt;br /&gt;
&lt;br /&gt;
A third report was provided in the virtual meeting (April 2020) including the study of SC42 ISO/IEC 24030 on AI use cases and the study of ISO/IEC 27701&lt;br /&gt;
&lt;br /&gt;
A fourth report was provide in the virtual meeting (Sep 2020) including a contribution to TC215 on security and privacy in eHealth. A preliminary work item is started&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2019 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Review of requirements for accredited certification for sector specific ISMS standards (S&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; line-height: 18.24px;&amp;quot;&amp;gt;tarted in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent; font-size: 16px;&amp;quot;&amp;gt;April 2019. Completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Hans Hedbom, Alan Shipman&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to review possible approaches to establishing the foundation for accredited certification for sector-specific standards. The concrete instantiation for this is ISO/IEC 27552, which is expected to be published soon.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Consent receipts and records&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;April 2019, completed in October 2019)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Collin Wallis, Andrew Hughes&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
The scope of this study period is to assess the need for a Consent Receipt and Record standard used to support transparency and accountability practices related to an individual's consent to PII processing&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy engineering model&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;(Started in&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 18.24px;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;April 2019, Completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| Study period to evaluate the development of a privacy engineering model intended to support privacy engineers, privacy architects and other practitioners as a bridge between ISO/IEC SC27 and other data privacy management standards and the technical and business process services and functionality needed to integrate data privacy control requirements in operational processes, systems and their ecosystems&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
As a result of this study period, a NWIP - Privacy operationalisation model and method for engineering has been established&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Guidance on processes of a privacy information management system (&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;Started in October 2019, Completed in September 2020))&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michael Steiner, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Determine if SC 27 needs a standard for “Guidance on processes of a privacy information management system” as part of the ISO /IEC 27000-family.&lt;br /&gt;
&lt;br /&gt;
Consider the following:&lt;br /&gt;
&amp;lt;ol style=&amp;quot;list-style-type: lower-roman;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001 and ISO/IEC 27003&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27701 (a.k.a. DIS 27552)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO Handbook “The integrated use of management system standards”&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 33004&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt;&amp;amp;nbsp;WD of ISO/IEC 27022&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Privacy for Fintech services&amp;amp;nbsp;&amp;lt;span style=&amp;quot;font-size: 16px;&amp;quot;&amp;gt;(Started in October 2019, completed in September 2020)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Heung Youl Youm, Gurshabad Grover, Janssen Esguerra&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Objectives&lt;br /&gt;
&lt;br /&gt;
*Apply privacy principles described in ISO/IEC 29100:2011&lt;br /&gt;
*Study use cases, applications, devices and underlying infrastructure related to providing Fintech services&lt;br /&gt;
*Consider privacy risks related to providing Fintech services&lt;br /&gt;
*Consider regulatory requirements that impact privacy of customers&lt;br /&gt;
*Consider all kinds of stakeholders: regulators, financial institutions, customers, product suppliers, application and service providers&lt;br /&gt;
*Study the necessity for guidelines on privacy where it could be used by relevant stakeholders to mitigate risks identified in the privacy risks assessment&lt;br /&gt;
&lt;br /&gt;
Protection of privacy of customers is a concern as a huge amount of PII is collected, transmitted, shared, used and analyzed at every instance in the interconnected Fintech services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2020 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 5181 Information technology - Security and privacy - Data provenance (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Ryan Ko, Jan de Meer, Yi Zhang&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Proposed Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information called meta-data, from sources, intermediaries and users creating, manipulating, and transforming data.&lt;br /&gt;
&lt;br /&gt;
The meta-data derived from data creations and transformations serves for earning trust in entities and stakeholders during the whole lifecycle of data use and data manipulations. By referring to provenance meta-data an information respectively a decision base is provided to processes or, to individuals. Provenance meta-data of data records can also be applied from both, processes, or individuals when they have to decide which one of their data, they want to make voluntarily available to the public as a common good and which one not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
1st report Nov 2020&lt;br /&gt;
&lt;br /&gt;
2nd report March 2021&lt;br /&gt;
&lt;br /&gt;
3rd report May 2021&lt;br /&gt;
&lt;br /&gt;
4th report Oct 2021&lt;br /&gt;
&lt;br /&gt;
5th report Feb 2022&lt;br /&gt;
&lt;br /&gt;
6th report April 2021&lt;br /&gt;
&lt;br /&gt;
7th report July 2022&lt;br /&gt;
&lt;br /&gt;
Draft for proposed new project September 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 6089 Impact of Artificial Intelligence on Security and Privacy (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-variant-numeric: normal; font-variant-east-asian: normal; background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&amp;lt;div style=&amp;quot;background-color: transparent; cursor: text; line-height: 20.8px; margin: 0px;&amp;quot;&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
'''Phase 1 (completed):''' Antonio Kung,&amp;amp;nbsp;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Srinivas Poosarla,&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;background-color: transparent;&amp;quot;&amp;gt;Peter Dickman,&amp;amp;nbsp;Gurshabad Grover, Peter Deussen, Heung Your Youm,&amp;amp;nbsp;&amp;lt;/span&amp;gt;Zhao Yunwei, Volker Smoljko&lt;br /&gt;
&lt;br /&gt;
'''Phase 2 (completed):''' Antonio Kung, Lenora Zimmerman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
'''Phase 1 (completed): '''The PWI has the objective to investigate the possibility to propose one or several documents&lt;br /&gt;
&lt;br /&gt;
*Part 1: a TR providing&lt;br /&gt;
**guidance on how to assess the impact of security and privacy of AI use cases,&lt;br /&gt;
**providing a security and privacy analysis of the use cases in ISO/IEC TR 24030 (AI use cases)&lt;br /&gt;
*Part 2: a TS providing&lt;br /&gt;
**an overview of privacy concerns for AI,&lt;br /&gt;
**guidance concerning AI-based systems&lt;br /&gt;
**additional recommendations concerning standards where appropriate&lt;br /&gt;
*Part 3: a TS providing&lt;br /&gt;
**an overview of security concerns for AI,&lt;br /&gt;
**guidance concerning AI-based systems&lt;br /&gt;
**additional recommendations concerning standards where appropriate&lt;br /&gt;
&lt;br /&gt;
The following work will be carried out in the PWI:&lt;br /&gt;
&lt;br /&gt;
*extend the content of the study period report with the following&lt;br /&gt;
**analysis of TR 24030 use cases from a security viewpoint,&lt;br /&gt;
**identification of standards for which specific recommendations concerning AI would be useful,&lt;br /&gt;
**identification of AI standards for which specific recommendations concerning security and privacy would be useful;&lt;br /&gt;
**identification of specific security controls; and&lt;br /&gt;
**whatever contributions that matches the intended content of part 1, part 2, and part 3.&lt;br /&gt;
*transform the report into a set of three documents that can be submitted as draft TR and TS;&lt;br /&gt;
*make a recommendation on the way to proceed concerning the three documents;&lt;br /&gt;
&lt;br /&gt;
'''Phase 2 (completed):&amp;amp;nbsp;'''Guidance on addressing privacy protection for artificial intelligence systems&lt;br /&gt;
&lt;br /&gt;
*Currently discussed scope:&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to identify and address privacy concerns in the development and use of artificial intelligence systems. The guidance in this document aims to provide information to organizations to help them better understand and address the impact of AI systems and Machine Learning techniques on individual privacy and society at-large. This document also addresses ways in which societal and regulatory expectations influence how AI systems and Machine Learning is and is not used.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use AI systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
1st PWI report was published in April 2021.&lt;br /&gt;
&lt;br /&gt;
2nd PWI report was published in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is the continuation of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Impact_of_Artificial_Intelligence_on_Privacy_.28Started_in_October_2018.2C_Completed_in_September_2020.29 study period] that concluded in September 2020&lt;br /&gt;
&lt;br /&gt;
Further to the completion of phase 1, part 1 is registered as a TR (ISO/IEC 27653; Impact of security and privacy in AI use cases), part 2 is still-on going. Note that part 3 has been transferred to another PWI 7699 (Guidance for addressing security threats and failures in artificial&amp;lt;br/&amp;gt;intelligence)&lt;br /&gt;
&lt;br /&gt;
Further to March 2022 meeting, PWI is working on making a new work item proposal on Guidance for privacy protection in AI systems&lt;br /&gt;
Further to October 2022 meeting, a ballot has been initiative for ISO/IEC 27091 Cybersecurity and data protection - Artificial intelligence - Privacy Protection&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 6102 Guidance on illustrative processes of a privacy information management system (Started in September 2020, Completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michael Steiner, Vishnu Kanhere&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Determine if SC 27 needs a standard for “Guidance on processes of a privacy information management system” as part of the ISO /IEC 27000-family.&lt;br /&gt;
&lt;br /&gt;
Consider the following:&lt;br /&gt;
&amp;lt;ol style=&amp;quot;list-style-type: lower-roman;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27001 and ISO/IEC 27003&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 27701 (a.k.a. DIS 27552)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO Handbook “The integrated use of management system standards”&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;ISO/IEC 33004&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt;&amp;amp;nbsp;WD of ISO/IEC 27022&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was cancelled because of lack of progress&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2021 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7748 Guidance and practices for privacy preservation based on zero-knowledge proofs (Started in April 2021, completed in October 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This work item is to provide guidance and best practices for privacy preservation based on zeroknowledge proofs, taking into account normative references and comparing specifically with ISO/IEC 27551, 27556 and 29191. It intends to cover the usage of zero-knowledge proof protocols for privacy preservation and PII protection in a wide range of data processing applications. It takes into account using zero knowledge proof based privacy-preserving verification system architectures, data process flows and module interfaces.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed, transformed into a NWIP 27565&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7732 Age verification (Started in April 2021, completed in October 2022)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Study the possibility to submit a new work item&lt;br /&gt;
&lt;br /&gt;
*Age Verification Systems –Part 1: Framework, Levels of Assurance and Privacy Protection&lt;br /&gt;
*Age Verification Systems –Part 2: Conformity Assessment&lt;br /&gt;
*Age Verification Systems –Part 3: Interoperability&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and transformed into project proposal 27566&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:medium;&amp;quot;&amp;gt;PWI 27045 Big data security and privacy - guidelines for data security management framework&amp;amp;nbsp;(Started in April 2021, completed in April 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Xiaoyuan Bai - Hongru Zhu - Vicky Hailey - Shiqi Li - Liu Dapeng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a data security management framework that helps organizations to build the data security capabilities in the context of big data including guidelines to develop security measures.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all organizations, regardless of type, size or nature, that develop or use big data systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/63929.html https://www.iso.org/standard/63929.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st PWI was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Is a WG4 project. An initial projects was started in October 2018 on processes with a different scope:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*1st WD was provided in January 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*2nd WD was provided in April 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*3rd WD was provided in October 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*4th WD was provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*5th WD was provided in November 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*6th WG was provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;*Project was restarted as a PWI in April 2021 with a new scope&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
It seems that the project will focus on security only&lt;br /&gt;
*1st PWI provided in May 2022&lt;br /&gt;
*2nd PWI provided in March 2023&lt;br /&gt;
*3rd PWI provided in October 2023&lt;br /&gt;
*NP in February 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27564 Privacy models (Started in October 2021, completed in April 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Yod Samuel Martin, Antonio Kung, Jonathan Fox, Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
Scope: PWI will study the value of specifying and maintaining privacy models&lt;br /&gt;
&lt;br /&gt;
Tasks:&lt;br /&gt;
&lt;br /&gt;
*Study use cases, e.g., connected vehicles, data spaces&lt;br /&gt;
*Define models of interest, e.g., protection models, engineering models, ecosystem models.&lt;br /&gt;
*Provide guidance on the lifecycle of models. Take into account ISO/IEC/IEEE 24641 (MBSSE), and liaise with SC7&lt;br /&gt;
*Provide guidance for the design of models ensuring a common vision with different viewpoints: citizen, policy, governance, compliance, engineering&lt;br /&gt;
*Explain the relationship with other standards; SC7, SC27, SC41, SC42, PC317…&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
completed and transformed into project prposal TS 27564&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2022 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27568 Security and privacy of digital twins (Started in October 2022 completed in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Srinivas Poosarla, Heung Youl Youm, Mark Lizar, Vitor Jesus, Vishnu Kanhere, Patrick Curry, Karim Tobich&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
The PWI will monitor the progress in standardisation work on digital twins and investigate stakeholders concerns on the security and privacy of digital twins.&lt;br /&gt;
&lt;br /&gt;
A call for contributions will circulated to SC 27/WG 5, and liaison will take place with SC41. A report and recommendation for further work will be prepared for discussion in the next meeting.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*A first report was provided at the April 2023 meeting.&lt;br /&gt;
*A second report was provided at the October 2023 meeting.&lt;br /&gt;
*A third report was provided at the April 2024 meeting.&lt;br /&gt;
*A proposal for a NP was provided at the March 2025 meeting.&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and transformed in TS 27568 Proposal&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2023 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27046&amp;amp;nbsp;Big data security and privacy&amp;amp;nbsp;- Implementation guidelines (restarted in April 2023)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Le Yu, Victoria Hailey, Jinghua Min&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This proposal aims to analyze challenges and risks of big data security and privacy, and proposes guidelines for implmentation of big data secuirty and privacy in aspects of big data resources, and organizing, distributing, computing and destroying big data&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78572.html https://www.iso.org/standard/78572.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in October 2019&lt;br /&gt;
*2nd WD was provided in June 2020&lt;br /&gt;
*3rd WD was provided in November 2020&lt;br /&gt;
*4th WD was provided in April 2021&lt;br /&gt;
*5th WD was provided in April 2022&lt;br /&gt;
*1st CD was provided in October 2022&lt;br /&gt;
*Further to April 2023 meeting, this project will be reverted to preliminary work item (PWI)&lt;br /&gt;
*Project cancelled in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27566 IS Age assurance - Part 2: Interoperability, technical architecture and guidelines for use (started in November 2023)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines for interoperability, technical architecture and use of age assurance&lt;br /&gt;
systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in November 2023&lt;br /&gt;
*1st PWI text provided in December 2023&lt;br /&gt;
*2nd PWI text provided in March 2024&lt;br /&gt;
*NP voted on September 2024&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Completed in September 2024 and replaced by a work item&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Started in 2024 and completed&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27569 Personal identifiable information (PII) processing record information structure (Started in April 2024, completed in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Jan Lindquist&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording&lt;br /&gt;
information relevant to the processing of Personally Identifiable Information (PII). This document further&lt;br /&gt;
provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
*provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
*provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
*exchange of PII processing information i.e. information on how PII is processed between information&lt;br /&gt;
systems; and,&lt;br /&gt;
*management of the lifecycle of PII processing as based in the use of specific lawful basis.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*A first report was provided at the October 2024&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Completed and led to 2nd edition of ISO/IEC 27560&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27573 Privacy protection of user avatar and system avatar interactions in the metaverse (Started in October 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
The necessity for a section on considerations regarding personal information in Metaverse standards and Specifications is emphasized. This is due to the direct impact on personal information by PII (Personally Identifiable Information) or related data subject information identification mechanisms.&lt;br /&gt;
&lt;br /&gt;
MSPA (Meta Standard Privacy Assessment) is utilized as a methodology for evaluating the impact on personal information, reviewing the necessity of introducing privacy protection or controls by assessing privacy protection requirements and potential threats in standards or specifications.&lt;br /&gt;
&lt;br /&gt;
This process also aids in analyzing and documenting potential damages that may occur to individuals.&lt;br /&gt;
&lt;br /&gt;
This document contains a framework for protecting personal information during interactions between user avatars and system avatars in the Metaverse. It shall specify the requirements for:&lt;br /&gt;
&lt;br /&gt;
*categorizing and managing the information generated and used by user avatars and system avatars;&lt;br /&gt;
*protecting the privacy of user avatars and personal data in the Metaverse.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Started in April 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Report provided in September 2029&lt;br /&gt;
*Second report provided in March 2025 with a proposal for a new project 27573 and a new PWI Privacy in metaverse frameworks&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27574 Privacy in brain-computer interface (BCI) applications (started in October 2024)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This standard provides requirements and guidelines on privacy for Brain Computer Interface&lt;br /&gt;
Applications. It provides privacy controls specific to Brain Computer Interface Applications&lt;br /&gt;
to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC&lt;br /&gt;
27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Started in April 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Proposal for study in April 2024&lt;br /&gt;
*Report provided in September 2024&lt;br /&gt;
*NWIP proposal provided in February 2025&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2202</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2202"/>
		<updated>2026-03-15T21:50:15Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 5181 IS Security and privacy - Data provenance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;7709 IS Security and privacy-preserving guidelines for multi-sourced data processing&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Binsheng Zhang, Heung Youl Youm &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on identification of the security and privacy risks related to multi-sourced data processing, and related techniques to mitigate the risks. This document is applicable to organizations that use multi-sourced data or provide data services to design and develop multi-sourced data processing related systems, enhancing the security of their data processing activities&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/82889.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2026&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIS to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2201</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2201"/>
		<updated>2026-03-15T21:40:14Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* PWI 27575 Privacy for metaverse frameworks (Started in March 2025) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIS to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy framework in the metaverse including support on AI agent orchesgration (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung, Mieko Okuma, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2200</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2200"/>
		<updated>2026-03-15T21:37:07Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIS to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2199</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2199"/>
		<updated>2026-03-15T21:35:26Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2198</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2198"/>
		<updated>2026-03-15T21:34:41Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2197</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2197"/>
		<updated>2026-03-15T21:34:17Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&lt;br /&gt;
| 27006-2:2021 TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2196</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2196"/>
		<updated>2026-03-15T21:31:33Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2025 IS Privacy information management systems — Requirements and guidances */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2195</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2195"/>
		<updated>2026-03-15T21:31:11Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2194</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2194"/>
		<updated>2026-03-15T21:30:30Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706:2025  2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2193</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2193"/>
		<updated>2026-03-15T21:28:18Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2025 IS Privacy information management systems — Requirements and guidances */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2192</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2192"/>
		<updated>2026-03-15T21:27:51Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2025 IS Privacy information management systems — Requirements and guidances */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Previous edition&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2191</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2191"/>
		<updated>2026-03-15T21:25:27Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2025 IS Privacy information management systems — Requirements and guidances */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2190</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2190"/>
		<updated>2026-03-15T21:23:46Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2025 IS Privacy information management systems — Requirements and guidances = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2189</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2189"/>
		<updated>2026-03-15T21:20:37Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2188</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2188"/>
		<updated>2026-03-15T21:20:01Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27701 IS Privacy information management systems — Requirements and guidances */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2025 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2187</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2187"/>
		<updated>2026-03-15T21:18:41Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27574 IS Privacy in brain-computer interface (BCI) applications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoti kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*Request for NP ballot initiated in April 2025&lt;br /&gt;
*1st WD to be provided in March 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2186</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2186"/>
		<updated>2026-03-15T21:16:09Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD provided in October 2025&lt;br /&gt;
* 2nc WD to be provide in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2185</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2185"/>
		<updated>2026-03-15T21:11:55Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27568 TS Security and privacy of digital twins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance for organizations to address security and privacy risks in digital twin systems. The guidance in this document helps organizations identify security and privacy risks throughout the digital twin system lifecycle, and establishes mechanisms to evaluate the consequences of such risks and treat them.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, academia, research institutions and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD provided in October 2025&lt;br /&gt;
*2nd WD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2184</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2184"/>
		<updated>2026-03-15T21:05:53Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*2nd CD to be provided in April 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2183</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2183"/>
		<updated>2026-03-15T21:01:46Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2182</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2182"/>
		<updated>2026-03-15T20:59:01Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27566-1:2025 IS Age assurance - Part 1: Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2181</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2181"/>
		<updated>2026-03-15T20:58:39Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2180</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2180"/>
		<updated>2026-03-15T20:58:11Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27566-1 IS Age assurance - Part 1: Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1:2025 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes a framework for age assurance systems and describes their core characteristics, including privacy and security, for enabling age-related eligibility decisions.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*FDIS provided in September 2025&lt;br /&gt;
*publication in December 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2179</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2179"/>
		<updated>2026-03-15T20:53:02Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27565 IS Guidance on privacy preservation based on zero-knowledge proofs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2178</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2178"/>
		<updated>2026-03-15T20:52:27Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27565 IS Guidance on privacy preservation based on zero-knowledge proofs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565:2026 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS provided in April 2025&lt;br /&gt;
*FDIS provided in October 2025&lt;br /&gt;
*publication in February 2026&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2177</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2177"/>
		<updated>2026-03-15T20:50:18Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2176</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2176"/>
		<updated>2026-03-15T20:49:13Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan Lindquist, Harshvardhan Pandit&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2025&lt;br /&gt;
*1st CD was provided in September 2025&lt;br /&gt;
*2nd CD to be provided in April 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2175</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2175"/>
		<updated>2026-03-15T20:47:00Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27555 Revision IS Guidelines on Personally Identifiable Information Deletion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in April 2026&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2174</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2174"/>
		<updated>2026-03-15T20:36:46Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS provided in October 2025&lt;br /&gt;
*FDiS to be provided in June 2026&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in January 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2173</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2173"/>
		<updated>2026-03-15T20:35:01Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27045 IS Big data security and privacy — Guidelines for managing big data risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS was provided in October 2025&lt;br /&gt;
*FDIS to be provided &lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in January 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2172</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2172"/>
		<updated>2026-03-15T20:26:21Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27018 2nd Edition - IS Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS to be provided in Octboer 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in January 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2171</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2171"/>
		<updated>2026-03-15T20:25:55Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 27018:2014 IS Code of practice for protection of PII in public clouds acting as PII processors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2025 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
*publication August 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018 2nd Edition - IS Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS to be provided in Octboer 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in January 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2170</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2170"/>
		<updated>2026-03-15T20:20:33Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 10267 IS Methods to quantify the amount of personal information in a dataset  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2014 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
It specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the protection of PII which might be applicable within the context of the information security risk environment(s) of a provider of public cloud services. The standard concerns public cloud only and cloud service providers acting as PII processors.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*Further to the April 2023 meeting, discussion is taking place for a revision&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD provided in October 2025&lt;br /&gt;
*DIS to be provided in April 2028&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018 2nd Edition - IS Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS to be provided in Octboer 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in January 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=ISO&amp;diff=2169</id>
		<title>ISO</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=ISO&amp;diff=2169"/>
		<updated>2026-03-15T19:01:56Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* 5181 IS Security and privacy - Data provenance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:ISO red.jpg|200px|ISO red.jpg]][[File:IEC logo.png|200px|IEC logo.png]]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this page is to provide a high-level view of activities related to privacy standards in ISO. It does not cover security standards (but it does cover standards that cover both security and privacy).&lt;br /&gt;
&lt;br /&gt;
Most projects are developed within&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;ISO/IEC JTC1/SC27.&amp;amp;nbsp;&amp;lt;/span&amp;gt;More info can be found on in the SC27 portal:&lt;br /&gt;
&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en http://www.jtc1sc27.din.de/cmd?level=tpl-home&amp;amp;languageid=en]&lt;br /&gt;
*[http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707 http://www.jtc1sc27.din.de/cmd?level=tpl-bereich&amp;amp;menuid=220707&amp;amp;languageid=en&amp;amp;cmsareaid=220707]&amp;amp;nbsp;(set of slides)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Note that the portal will in general contain more information than this wiki, which&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;&amp;amp;nbsp;focuses mainly on work carried out in&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''ISO/IEC JTC1/SC27/WG5'''''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;The convenor is '''Kai Rannenberg''', and the vice convenor is '''Jan Schallaböck'''.&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;WG5 regularly publishes a document a standing document (SG1) on WG5 roadmap. It can be found in&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.din.de/en/meta/jtc1sc27/downloads [1]]&lt;br /&gt;
&lt;br /&gt;
Some of the projects are also carried out in&amp;amp;nbsp;'''ISO/IEC JTC1/SC27/WG4'''''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;.&amp;lt;/span&amp;gt;''&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The convenor is '''Faud Khan''', and the vice convenor is '''Johann Amsenga'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Projects related to consumer protections are carried out ​within '''ISO PC317''' from 2018 to 2023 and within '''ISO/IEC JTC 1/SC 44 (Consumer protection in the field of privacy by design)''' since 2024,  convened by '''Jan Schallaböck'''. This included the development of ISO 31700 (Consumer protection: privacy by design for consumer goods and services).&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Some conventions on ISO standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The important things to know concerning ISO standards steps:&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 18.9090900421143px&amp;quot;&amp;gt;Standard&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;CD: Committee Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DIS: Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;FDIS: Final Draft International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;IS: International Standard&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical report&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New work item proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New work item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTR: Draft Technical Report (formerly PDTR: Preliminary Draft Technical Report)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;TR: Technical Report&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Technical specification&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;ul style=&amp;quot;line-height: 20.7999992370605px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;PWI: Preliminary work item (previously&amp;amp;nbsp;SP: Study period in SC27)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NWIP: New Work Item Proposal&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;NP: New Work Item&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;WD: Working Draft&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;DTS: Draft Technical Specification&amp;amp;nbsp;&amp;amp;nbsp;(formerly PDTS: Preliminary Draft Technical Specification)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Technical Specification&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Progress is finalised in plenary&amp;amp;nbsp;meetings (taking place every 6 months).&lt;br /&gt;
&lt;br /&gt;
Here is a list of meetings that took place or that will take place in SC27.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 500px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2014&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;April 7-15, 2014 Hong Kong&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Oct 20-24, 2014 Mexico City, Mexico&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2015&lt;br /&gt;
| &lt;br /&gt;
*May 4-12, 2015 Kuching, Malaysia&lt;br /&gt;
*Oct 26-30, 2015 Jaipur, India&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2016&lt;br /&gt;
| &lt;br /&gt;
*April 11-15, 2016 &amp;amp;nbsp;Tampa, USA&lt;br /&gt;
*Oct 23 (sunday) - 27 (thursday), 2016, Abu Dhabi, UAE&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2017&lt;br /&gt;
| &lt;br /&gt;
*April 18-22, 2017, Hamilton, New Zealand&lt;br /&gt;
*Oct 30- Nov 3, 2017, &amp;amp;nbsp;Berlin, Germany&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*April, 16-20 Wuhan, China&lt;br /&gt;
*Sept 30 - Oct 4 - Gjovik, Norway&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*April 1-5, Tel-Aviv,&amp;amp;nbsp;Israel&lt;br /&gt;
*October 14-18, Paris, France&lt;br /&gt;
*19 October, Paris (jointly with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*April 21-26, Virtual meeting&lt;br /&gt;
*Sept 12-16, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*April 12-15, Virtual meeting&lt;br /&gt;
*October 19-29, Virtual meeting&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*March 29 - April 8, Virtual meeting&lt;br /&gt;
*Sept 26-30, Hybrid meeting - Luxembourg -&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2023&lt;br /&gt;
| &lt;br /&gt;
*April 17-21, Hybrid meeting - Redmond, US&lt;br /&gt;
*October 16-20, Hybrid meeting - Seoul, Korea&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2024&lt;br /&gt;
| &lt;br /&gt;
*April 8-12, Hybrid meeting - Manchester, UK&lt;br /&gt;
*September 26 - October 5, Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*March 10-14, Hybrid meeting - Fairfax USA&lt;br /&gt;
*September 8-12, Hybrid meeting - Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Meetings ISO/IEC JTC 1/SC 44 Consumer protection in the field of privacy by design&amp;lt;/span&amp;gt; ==&lt;br /&gt;
ISO 31700&amp;amp;nbsp;is dealt with in another committee (PC317 initially and now iSO/IEC JTC1/SC44). Here is a list of meetings that took place or that will take place in PC317.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 500px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| 2018&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;Nov 1-2, 2018, London (PC317)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2019&lt;br /&gt;
| &lt;br /&gt;
*Feb 6-8, Berlin (PC317 adhoc group)&lt;br /&gt;
*May 20-23, Toronto  (PC317)&lt;br /&gt;
*19 October, Paris (PC317 jointly with SC27)&lt;br /&gt;
*21-23 October, Paris (PC317 colocated with SC27)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2020&lt;br /&gt;
| &lt;br /&gt;
*17-20 March, Virtual meeting  (PC317)&lt;br /&gt;
*30 Sept - 2 Oct, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2021&lt;br /&gt;
| &lt;br /&gt;
*19-22 March, Virtual meeting  (PC317)&lt;br /&gt;
*13-17 September, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2022&lt;br /&gt;
| &lt;br /&gt;
*16-20 May, Virtual meeting  (PC317)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| 2025&lt;br /&gt;
| &lt;br /&gt;
*16-18 September, Hybrid meeting, Kunming, China&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;Privacy references lists&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The SC 27/WG 5 Standing Document 2 contains references with relevant descriptions to privacy-related:&lt;br /&gt;
&lt;br /&gt;
*Privacy regulatory authorities and regulations.&lt;br /&gt;
*Standards.&lt;br /&gt;
*Guidelines.&lt;br /&gt;
*Newsletters and forums.&lt;br /&gt;
*Organisations and associations.&lt;br /&gt;
*Projects.&lt;br /&gt;
*Data retention periods.&lt;br /&gt;
&lt;br /&gt;
The WG5 Standing Document 2 shall not be considered as:&lt;br /&gt;
&lt;br /&gt;
*Legal interpretations.&lt;br /&gt;
*Having been legally validated by a global law firm or relevant lawyers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf https://www.din.de/resource/blob/78924/5ced65e40dcbe6e503c2392c75f3dd1e/sc27wg5-sd2-data.pdf]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This document is regularly updated&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;19608:2018 TS&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;Guidance for developing&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger; line-height: 1.2;&amp;quot;&amp;gt;security and privacy functional requirements based on 15408&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Naruki Kai&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Thi&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;s Technical Report provides guidance for:&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*developing privacy functional requirements as extended components based on privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2&lt;br /&gt;
*selecting and specifying Security Functional Requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII)&lt;br /&gt;
*procedure to define both privacy and security functional requirements in a coordinated manner&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/65459.html https://www.iso.org/standard/65459.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
has been moved from TR to TS&lt;br /&gt;
&lt;br /&gt;
Published in October 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20547-4:2020 IS Big data reference architecture - Part 4 - Security and privacy&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jinhua Min, Xuebin Zhou&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| ScopeS&lt;br /&gt;
| Specifies security and privacy aspects of the big data reference architecture including governance, collection, processing, exchange, storage and identification&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Is the follow-up of the NIST initiative for a big data interoperability framework. Reports are available there:&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-1.pdf [1]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-2.pdf [2]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-3.pdf [3]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-4.pdf [4]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-5.pdf [5]],&amp;amp;nbsp;[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-6.pdf [6]],&amp;amp;nbsp;​[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-7.pdf [7]]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/71278.html https://www.iso.org/standard/71278.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in May 2017&lt;br /&gt;
*3rd WD provided in November 2017&lt;br /&gt;
*4th WD provided in April 2018&lt;br /&gt;
*1st CD provided in November 2018&lt;br /&gt;
*2nd CD provided in October 2019&lt;br /&gt;
*DIS published in October 2019&lt;br /&gt;
*FDIS publised in May 2020&lt;br /&gt;
*Published in September 2020&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
WG9 is working on the following&lt;br /&gt;
&lt;br /&gt;
*20546&amp;amp;nbsp;: big data overview and vocabulary&lt;br /&gt;
*20547&amp;amp;nbsp;: big data reference architecture&lt;br /&gt;
**Part 1: Framework and application process (TR)&lt;br /&gt;
**Part 2: Use cases and derived requirements (TR)&lt;br /&gt;
**Part 3: Reference architecture (IS)&lt;br /&gt;
**Part 4: Security and privacy fabric (IS)&lt;br /&gt;
**Part 5: Standards roadmap (TR)&lt;br /&gt;
&lt;br /&gt;
Part 4 is transferred to SC27 for development, with close liaison with WG 9&lt;br /&gt;
&lt;br /&gt;
[Antonio Kung] The 20547 reference architecture should be instantiated into domain specific real architectures (e.g. health, transport, energy...). 20547-4 should therefore&lt;br /&gt;
&lt;br /&gt;
*contain the generic elements that could be the starting point to derive a domain specific security and privacy fabric&lt;br /&gt;
*address the 5 Vs concern (volume, velocity, variety, veracity, value)&lt;br /&gt;
&lt;br /&gt;
Further to Berlin meeting, decision to change title (term fabric is removed)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;20889:2018 IS Privacy enhancing de-identification terminology and classification of techniques&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Chris Mitchell and&amp;amp;nbsp;Lionel Vodzislawsky&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| This international standard provides a description of privacy enhancing data de-identification techniques, to be used for describing&amp;lt;br/&amp;gt;and designing de-identification measures in accordance with the privacy principles in ISO/IEC 29100.&amp;lt;br/&amp;gt;In particular, this International Standard specifies terminology, a classification of de-identification techniques according to their&amp;lt;br/&amp;gt;characteristics, and their applicability for minimizing the risk of re-identification&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Slides presented by Chris Mitchel during IPEN workshop (June 5th 2015):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf http://ipen.trialog.com/wiki/File:CM_slide_for_150605.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/fr/standard/69373.html https://www.iso.org/fr/standard/69373.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD December 2015&lt;br /&gt;
*2nd WD June 2016&lt;br /&gt;
*1st CD Devember 2016&lt;br /&gt;
*2nd CD May 2017&lt;br /&gt;
*1st DIS January 2018&lt;br /&gt;
*FDIS August 2018&lt;br /&gt;
*Published in November 2018&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27006-2:2021&amp;amp;nbsp;TS Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Helge Kreutzmann, Fuki Azetsu, Hans Hedbom, Alan Shipman&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006 and ISO/IEC 27701. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
Conformance to the requirements contained in this document needs to be demonstrated in terms of competence and reliability by certification body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for certification body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71676.html https://www.iso.org/standard/71676.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in Paris October 2019&lt;br /&gt;
*1st DTS published in July 2020,&lt;br /&gt;
*2nd DTS published in October 2020&lt;br /&gt;
*Publication in February 2021&lt;br /&gt;
*Further to the March 2022 meeting, a revision is underway. This project has been renumbered to 27706 and renamed to Requirements for bodies providing audit and certification of&lt;br /&gt;
privacy information management systems (see [https://ipen.trialog.com/wiki/ISO#27706_IS_Requirements_for_bodies_providing_audit_and_certification_of_privacy_information_management_systems link below])&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018:2014 IS Code of practice for protection of PII in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
It specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the protection of PII which might be applicable within the context of the information security risk environment(s) of a provider of public cloud services. The standard concerns public cloud only and cloud service providers acting as PII processors.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*Further to the April 2023 meeting, discussion is taking place for a revision&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27400:2022  IS Security and Privacy for the Internet of Things&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Faud Khan, Koji Nakao, Luc Poulin, Antonio Kung (initial stages)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on risks, principles and controls for security and privacy of Internet of Things (IoT).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Started in Wuhan April 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD provided in June 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD provided in November 2018&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd WD provided in June 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st CD provided in December 2019&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd CD provided in May 2020&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;3rd CD provided in March 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;DIS provided in April 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;FDIS provided in January 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Published in June 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Privacy guidelines for IoT (WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security guidelines for IoT (WG4)&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;SP Security and privacy guidelines for IoT (WG4 with participation of WG5)&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Aprll 2020: Renamed from 27030 to 27400&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27402:2023&amp;amp;nbsp;IS IoT&amp;amp;nbsp;security and privacy&amp;amp;nbsp;- Device baseline requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Elaine Newton, Amit Elazari Bar On, Faud Khan&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides baseline ICT requirements for IoT devices to support security and privacy controls&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/80136.html https://www.iso.org/standard/80136.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in May 2020&lt;br /&gt;
*1st CD provided in November 2020&lt;br /&gt;
*2nd CD provided in July 2021&lt;br /&gt;
*DIS provided in December 2022&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*Publication in November 2023&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Is a WG4 project. Delay between 2nd CD and DIS was due to discussions on requirements conformance (e.g. 27402 focuses on device requirements rather than device developer requirements)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27403:2024&amp;amp;nbsp;IS Security techniques - ioT security and privacy - Guidelines for&amp;amp;nbsp;IoT domotics&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Qin QIu, Yanghuichen Lin, Luc Poulin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/78702.html https://www.iso.org/standard/78702.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
Started in Paris October 2018 with a preliminary version&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2019&lt;br /&gt;
*2nd WD provided in May 2020&lt;br /&gt;
*3rd WD provided in March 2021&lt;br /&gt;
*4th WD provided in April 2021&lt;br /&gt;
*5th WD provided in May 2021&lt;br /&gt;
*6th WD provided in July 2021&lt;br /&gt;
*1st CD provided in January 2022&lt;br /&gt;
*2nd CD provided in June 2022&lt;br /&gt;
*DIS provided in October 2022&lt;br /&gt;
*2nd DIS provided in April 2023&lt;br /&gt;
*FDIS provided in January 2024&lt;br /&gt;
*Publication in June 20é4&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a WG4 project&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27550:2019&amp;amp;nbsp;&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: 18.252px; line-height: 21.9024px;&amp;quot;&amp;gt;TR Privacy engineering for system lifecycle processes&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Antonio Kung, Mathias Reinis&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This technical report provides privacy engineering guidelines that are intended to help organisations integrate recent advances in privacy engineering into their engineering practices:&lt;br /&gt;
&lt;br /&gt;
*it describes the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management);&lt;br /&gt;
*it describes privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, architecture design;&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organisations responsible for privacy, development, product management, marketing, and operations&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
A youtube presentation on privacy engineering:&amp;amp;nbsp;[https://www.youtube.com/watch?v=BymNvbmSr2E https://www.youtube.com/watch?v=BymNvbmSr2E]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/72024.html https://www.iso.org/standard/72024.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in January 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st PDTR provided in January 2018&lt;br /&gt;
*2nd PDTR provided in June 2018&lt;br /&gt;
*3rd PDTR provided in October 2018&lt;br /&gt;
*Version for publication provided in April 2019&lt;br /&gt;
*Publication in September 2019&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
[Antonio Kung]&lt;br /&gt;
&lt;br /&gt;
*Follows ISO/IEC 15288&amp;amp;nbsp;Systems and software engineering -- System life cycle processes&lt;br /&gt;
*Integrates major results from NIST 8062, CNIL PIA, ULD proposal on privacy protection goals (unlinkability, transparency, intervenabilty), LINDDUN threat analysis and mitigation taxonomy, Radboud university design strategies&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27551:2021 IS Requirements for attribute-based unlinkable entity authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Nat Sakimura,&amp;amp;nbsp;Jaehoon Na,&amp;amp;nbsp;Pascal Pailler&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard&lt;br /&gt;
&lt;br /&gt;
*Defines a framework including terms, entity roles and interactions for attribute-based unlinkable entity authentication, and&lt;br /&gt;
*Specifies requirements for attribute-based unlinkable entity authentication implementations.&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to any information system that performs attribute-based unlinkable entity authentication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/44373.html https://www.iso.org/standard/44373.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in Dec 2017&lt;br /&gt;
*3rd WD provided in July 2018&lt;br /&gt;
*4th WD provided in February 2019&lt;br /&gt;
*1st CD provided in October 2019&lt;br /&gt;
*DIS provided in November 2019&lt;br /&gt;
*FDIS provided in September 2020&lt;br /&gt;
*Published in September 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555:2021 IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Dorotea Alessandra de Marco, Yan Sun,&amp;amp;nbsp;Volker Hammer&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in June 2019&lt;br /&gt;
*1st CD provided in December 2019.&amp;amp;nbsp;&amp;amp;nbsp;Title changed (former title: establishing a PII deletion concept in organisations)&lt;br /&gt;
*2nd CD was published in June 2020&lt;br /&gt;
*DIS was provided in January 2021&lt;br /&gt;
*FDIS was provided in April 2021&lt;br /&gt;
*Publication in October 2021&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27556:2022&amp;amp;nbsp;IS User-centric privacy preferences management framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Shinsaku Kiyomoto, Antonio Kung, Heung Youl Youm&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in Gjovik (October 2018)&lt;br /&gt;
*1st WD provided In June 2019&lt;br /&gt;
*2nd WD provided in December 2019&lt;br /&gt;
*1st CD provided in May 2020&lt;br /&gt;
*2nd CD provided in October 2020&lt;br /&gt;
*3rd CD provided in April 2021&lt;br /&gt;
*DIS provided in October 2021&lt;br /&gt;
*FDIS provided in May 2022&lt;br /&gt;
*Publication in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;font-size: 10pt; line-height: 107%; font-family: Arial, sans-serif;&amp;quot;&amp;gt;[https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Project named changed from &amp;quot;User-centric framework for the handling of personally identifiable information (PII) based on privacy preferences&amp;quot; to &amp;quot;User-centric privacy preferences management framework&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27557:2022&amp;amp;nbsp;IS Organizational privacy risk management&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Kimberly Lucy, Markus Gierschmann, Kelvin Magtalas, Carlo Harpes&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Provides guidelines for organizational privacy risk management.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Designed to provide guidance to organizations processing personally identifiable&amp;amp;nbsp;information (PII) for integrating risks to the organization related to the processing of PII, including&amp;amp;nbsp;the privacy impact to individuals, as part of an organizational privacy risk management program.&lt;br /&gt;
&lt;br /&gt;
Assists in the implementation of a risk-based privacy program which can be&amp;amp;nbsp;integrated in the overall risk management of the organization, and supports the requirement for risk&amp;amp;nbsp;management as specified in management systems (such as ISO/IEC 27701:2019).&amp;lt;br/&amp;gt;This document is applicable to all types and sizes of organizations, including public and private&amp;amp;nbsp;companies, government entities and not-for-profit organizations, which are organizations&amp;amp;nbsp;processing PII, or developing products and services that can be used to process PII.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71674.html https://www.iso.org/standard/71674.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was published in May 2020&lt;br /&gt;
*2nd WD was published in October 2020&lt;br /&gt;
*1st CD was published in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27559:2022&amp;amp;nbsp;IS Privacy-enhancing data de-identification framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Malcolm Townsend, Santa Borel&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations implementing data de-identification processes for privacy enhancing purposes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71677.html https://www.iso.org/standard/71677.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in July 2020&lt;br /&gt;
*2nd WD was provided in February 2021&lt;br /&gt;
*1st CD was prrovided in April 2021&lt;br /&gt;
*DIS was provided in October 2021&lt;br /&gt;
*FDIS was provided in June 2022&lt;br /&gt;
*Published in November 2022&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560:2023&amp;amp;nbsp;TS Privacy technologies – Consent record information structure&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open and extensible information structure for recording PII Principals'&amp;amp;nbsp;or data subjects'&amp;amp;nbsp;consent to data processing. This document&amp;amp;nbsp;further&amp;amp;nbsp;provides guidance on the use of consent receipts and consent records associated with a&amp;amp;nbsp;PII Principal's data processing&amp;amp;nbsp;consent&amp;amp;nbsp;to support&amp;amp;nbsp;the:&lt;br /&gt;
&lt;br /&gt;
—&amp;amp;nbsp;provision of&amp;amp;nbsp;a record of the&amp;amp;nbsp;consent&amp;amp;nbsp;to&amp;amp;nbsp;the PII Principal;&lt;br /&gt;
&lt;br /&gt;
— exchange of consent information between information systems; and,&lt;br /&gt;
&lt;br /&gt;
— management of the lifecycle of the&amp;amp;nbsp;recorded&amp;amp;nbsp;consent.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80392.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD was provided in May 2020&lt;br /&gt;
*2nd WD was provided in January 2021&lt;br /&gt;
*3rd WD was provided in April 2021&lt;br /&gt;
*4th WD was provided in October 2021&lt;br /&gt;
*5th WD was provided in June 2022&lt;br /&gt;
*DTS was provided in October 2022&lt;br /&gt;
*Publication in August 2023&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27561:2024 IS POMME Privac&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;y operationalization model and method for engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| John Sabo, Antonio Kung, Srinivas Poorsala, Dorotea Alessandra de Marco,&amp;amp;nbsp;Aswathy KUMAR&amp;amp;nbsp, Michele Drgon;&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document describes a model and method to operationalize privacy principles into sets of controls and functional capabilities.&lt;br /&gt;
&lt;br /&gt;
*the method is described as a process following ISO/IEC/IEEE 24774;&lt;br /&gt;
*it operationalizes ISO/IEC 29100;&lt;br /&gt;
*it is intended for engineers and other practitioners developing systems controlling or processing PII;&lt;br /&gt;
*it is designed for use with other standards and privacy guidance;&lt;br /&gt;
*it supports networked, interdependent applications and systems.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80394.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*1st CD provided in May 2022&lt;br /&gt;
*2nd CD provided in November 2022&lt;br /&gt;
*DIS provided in May 2023&lt;br /&gt;
*FDIS provided in October 2023&lt;br /&gt;
*standard published in March 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the&amp;amp;nbsp;[https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_engineering_model.C2.A0.28Started_in.C2.A0April_2019.2C_Completed_in_September_2020.29 study period privacy engineering model]&lt;br /&gt;
&lt;br /&gt;
It is based on OASIS-PMRM http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27562:2024 IS Privacy guidelines for fintech services&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Heung Youl Youm, Janssen Esguerra&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on privacy for fintech services.&lt;br /&gt;
&lt;br /&gt;
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.&lt;br /&gt;
&lt;br /&gt;
This document is based on the principles from ISO/IEC 29100, ISO/IEC 27701, and ISO/IEC 29184, the privacy impact assessment framework described in ISO/IEC 29134, and the risk management guideline described in ISO 31000. It also provides guidelines focusing on a set of privacy requirements for each stakeholder.&lt;br /&gt;
&lt;br /&gt;
This document can be applicable to all kinds of organizations such as regulators, institutions, service providers and product providers in the fintech service environment.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80395.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*1st WD provided in April 2021&lt;br /&gt;
*2nd WD provided in October 2021&lt;br /&gt;
*3rd WD provided in May 2022&lt;br /&gt;
*1st CD provided in November 2023&lt;br /&gt;
*2nd CD provided in May 2023&lt;br /&gt;
*DIS provided in November 2023&lt;br /&gt;
*FDIS provided in May 2024&lt;br /&gt;
*Publication in December 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of the [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#Privacy_for_Fintech_services.C2.A0.28Started_in_October_2019.2C_completed_in_September_2020.29 study period privacy guidelines for Fintech services]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27563:2023 TR Security and privacy in artificial intelligence use cases - Best practices&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| Antonio Kung, Peter Dickman, Heung Youl Youm, Yunwei Zhao, Volker Smoljko, Kelvin Magtalas, Srinivas Poorsala&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides information on how to assess the impact of security and privacy in AI use cases, covering in particular those published in ISO/IEC TR 24030 (Information technology – Artificial Intelligence (AI) – use cases)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80396.html&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 24030 covers&amp;amp;nbsp;132 use cases that are described here:&amp;amp;nbsp;&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/24030/ed-1/en/Use+cases-v05_electronic_attachment_022021.pdf&lt;br /&gt;
&lt;br /&gt;
ISO/IEC 27563 covers the security of privacy of the 132 use cases, described here:&amp;amp;nbsp;https://standards.iso.org/iso-iec/tr/27563/ed-1/en/Security-privacy-AI-use-cases.pdf&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Established in October 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Draft TR was provided in December 2021&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to March 2022 meeting, title is changed from ''Impact of security and privacy in AI use cases'' to ''security and privacy in AI use cases'', and 2nd Draft TR was provided in May 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;3rd draft DTR was provided in September 2022&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;color: rgb(37, 37, 37); font-family: sans-serif; font-size: 14px;&amp;quot;&amp;gt;Further to April 2023 meeting, publication was mede in May 2023&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It is the result of phase 1 of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of AI on security and privacy]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27564:2025 TS Privacy protection - Guidance on the use of models for privacy engineering&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Michelle Chibba, Antonio Kung, Jonathan Fox, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on how to use modelling in privacy engineering.&lt;br /&gt;
It describes categories of models that can be used, the use of modelling to support engineering, and the relationships with other references and standards for privacy engineering and for modelling..&lt;br /&gt;
It provides high-level use cases describing how models are used.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
https://www.iso.org/standard/89319.html&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*1st DTS provided in April 2025&lt;br /&gt;
*Published in September 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Initiated as a result of the H2020 project [https://www.pdp4e-project.eu/ PDP4E]&lt;br /&gt;
&lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27564_Privacy_models_(Started_in_October_202,_completed_in_April_20241) PWI 27564 Privacy models]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27570:2021 TS&amp;amp;nbsp;Privacy Guidelines for Smart Cities&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Antonio Kung, Heung Youl Youm, Clotilde Cochinaire&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The document takes into account a multiple agency as well as a citizen centric viewpoint, and provides guidance on how privacy standards can be used at a global level and at an organisational level for the benefit of citizens&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that provides service in the smart city environments&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;font color=&amp;quot;#333333&amp;quot;&amp;gt;[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&amp;lt;/font&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;1st WD was provided in June 2018 further the Wuhan meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;2nd WD was provided in October 2018 further to the Gjovik meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 1st PDTS was provided in May 2019 further to the Tel Aviv meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 2nd PDTS was provided in November 2019 further to the Paris meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;A 3rd PDTS was provided in May 2020 further to the April 2020 virtual meeting&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The document will go to publication further to the September 2020 virtual meeting.&amp;lt;/span&amp;gt;&lt;br /&gt;
*&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;The standard was published in January 2021 see following press release:&amp;amp;nbsp;&amp;lt;/span&amp;gt;[https://www.iso.org/news/ref2631.html https://www.iso.org/news/ref2631.html]&lt;br /&gt;
*The standard was confimed in October 2024&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
First ecosystem oriented standard for privacy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Follow up of SP Privacy in Smart cities&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Liaison will take place with WG11 (smart cities), SC40 (&amp;lt;/span&amp;gt;IT Service Management and IT Governance), TC268/SC1/WG4 (sustainable cities and communities), EIP-SCC (European Innovation Platform - Smart Cities and Communities)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701:2019 IS Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm, Oliver Weissmann, Srinivas Poosarla&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.&lt;br /&gt;
&lt;br /&gt;
Excluding any of the requirements specified in clause 5 of this document is not acceptable when an organization claims conformity to this document.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/71670.html https://www.iso.org/standard/71670.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in April 2017&lt;br /&gt;
*2nd WD provided in June 2017&lt;br /&gt;
*1st CD provided in April 2018&lt;br /&gt;
*2nd CD provided in June 2018&lt;br /&gt;
*DIS provided in March 2019&lt;br /&gt;
*Publication in August 2019&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Was initially ISO/IEC 27552. Was renamed to ISO/IEC 27701 in August 2019&lt;br /&gt;
&lt;br /&gt;
A second version is underway since Mid 2023 with a title change: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29100:2011 IS Privacy framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Revision&amp;amp;nbsp;: Nat Sakimura, Jan Schallaboeck&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;This International Standard provides a framework for defining privacy control requirements related to personally identifiable information within an information and communication technology environment.&amp;lt;/span&amp;gt;&amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;This International Standard is designed for those individuals who are involved in specifying, procuring, architecting, designing, developing, testing, administering and operating ICT systems.&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Is a free standard&amp;amp;nbsp;: see&amp;amp;nbsp;&amp;lt;/span&amp;gt;[http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Revision published in February 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29101:2018 IS Privacy architecture framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Stefan Weiss and Dan Bogdanov,&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;For revision: Nat Sakimura, Shinsaku Kiyomoto&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard describes a privacy architecture framework that&lt;br /&gt;
&amp;lt;ol style=&amp;quot;line-height: 18.9090900421143px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;describes concerns for ICT systems that process PII;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;lists components for the implementation of such systems; and&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides architectural views contextualizing these components.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principals.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/75293.html https://www.iso.org/standard/75293.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
*1st edition published in april 2013&lt;br /&gt;
*Current edition confirmed in May 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29134:2023 IS Guidelines for Privacy impact assessment&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Mathias Reinis&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document gives guidelines for:&lt;br /&gt;
&lt;br /&gt;
*a process on privacy impact assessments, and&lt;br /&gt;
*a structure and content of a PIA report.&lt;br /&gt;
&lt;br /&gt;
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/fr/standard/86012.html&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 1.6&amp;quot;&amp;gt;Published in June 2017&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
*Is the second edition. First edition was published in 2017&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151:2017 IS Code of Practice for PII Protection (also a ITU document - ITU-T X.1058)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard establishes commonly accepted control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of Personally Identifiable Information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for processing PII which may be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This International Standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which process PII, as part of their information processing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
March 3rd presentation made by editor during an informal confcall with Dawn Jutla (OASIS) and Antonio Kung (PRIPARE):&amp;amp;nbsp;[http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf http://ipen.trialog.com/wiki/File:X.gpim-29151_oasis.pdf]&lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Published in August 2017&lt;br /&gt;
*PWI 8888 to prepare revision in March 2023&lt;br /&gt;
*1st CD of revision provided in October 2023&lt;br /&gt;
*2nd CD of revision to be provided in Apri 2924&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;line-height: 21.9px;&amp;quot;&amp;gt;29184:2020 IS Online privacy notices and consent&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Nat Sakimura, Srinivas Poorsala, Jan Schallaboeck&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document is a specification for the content and the structure of online privacy notices as well as the process of requesting consent to collect and process PII from a PII principal.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all situations, where a PII controller or any other entity processing PII interacts with PII principals in any online context.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/71678.html https://www.iso.org/standard/71678.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in June 2016&lt;br /&gt;
*2nd WD provided in April 2017&lt;br /&gt;
*3rd WD provided in June 2017&lt;br /&gt;
*1st CD provided in December 2017&lt;br /&gt;
*2nd CD provided in July 2018&lt;br /&gt;
*3rd CD provided in March 2019&lt;br /&gt;
*DIS provided in may 2019&lt;br /&gt;
*FDIS provide in march 2020&lt;br /&gt;
*Publication in June 2020&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Initiated in Jaipur (Oct 2015)&lt;br /&gt;
Follows Study Period initiated in Kuching (May 2015) User friendly online privacy notice and consent&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;29190:2015 IS Privacy capability assessment model&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.8px;&amp;quot;&amp;gt;Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.&amp;amp;nbsp;&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;In particular, it:&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;ul style=&amp;quot;line-height: 18.9091px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies steps in assessing processes to determine privacy capability;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;specifies a set of levels for privacy capability assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on the key process areas against which privacy capability can be assessed;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance for those implementing process assessment;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;provides guidance on how to integrate the privacy capability assessment into organizations operations&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45269.html https://www.iso.org/standard/45269.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;29191:2012 IS Requirements for partially anonymous, partially unlinkable authentication&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Kazue Sako (NEC)&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This International Standard defines requirements on relative anonymity with identity escrow based on the model of authentication and authorization using group signature techniques.&lt;br /&gt;
&lt;br /&gt;
This document provides guidance to the use of group signatures for data minimization and user convenience.&lt;br /&gt;
&lt;br /&gt;
This guideline is applicable in use cases where authentication or authorization is needed.&lt;br /&gt;
&lt;br /&gt;
It allows the users to control their anonymity within a group of registered users by choosing designated escrow agents.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/45270.html https://www.iso.org/standard/45270.html]&lt;br /&gt;
|-&lt;br /&gt;
| Comments&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
*Published in December 2012&lt;br /&gt;
*Minor revision for FDIS in July 2024&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;ISO PC317 and ISO/IEC JTC 1/SC 44 published standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-1:2023 IS Consumer Protection - Privacy-by-design for consumer goods and services - High level requirements&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
Specification of the design process to provide consumer goods and services that meet consumers’ domestic processing privacy needs as well as the personal privacy requirements of Data Protection.&lt;br /&gt;
&lt;br /&gt;
In order to protect consumer privacy the functional scope includes security in order to prevent unauthorized access to data as fundamental to consumer privacy, and consumer privacy control with respect to access to a person’s data and their authorized use for specific purposes.&lt;br /&gt;
&lt;br /&gt;
The process is to be based on the ISO 9001 continuous quality improvement process and ISO 10377 product safety by design guidance, as well as incorporating privacy design JTC1 security and privacy good practices, in a manner suitable for consumer goods and services&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Official start date: November 1 2018&lt;br /&gt;
*First meeting:&amp;amp;nbsp;November 1-2 2018, BSI London&lt;br /&gt;
*Adhoc meeting, February 24-24, 2019, DIN Berlin&lt;br /&gt;
*Second meeting&amp;amp;nbsp;: May 21-23 2018, Toronto, where 1st working draft will be discussed&lt;br /&gt;
*Joint JTC1/SC27/WG5 and PC317/WG1 meeting: October 19th 2019, Paris&lt;br /&gt;
*Third meeting: October 21-23 2019 AFNOR Paris&lt;br /&gt;
*Fourth meeting: March 17-20 2020 Virtual&lt;br /&gt;
*Fifth meeting: Sep 30-Oct 2 2020 Virtual&lt;br /&gt;
*Sixth meeting: April 19-22 2021 Virtual&lt;br /&gt;
*Seventh meeting September 13-17 2021 Virtual&lt;br /&gt;
*Eight meeting May 16-19 2022 Virtual&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st WD provided in March 2019&lt;br /&gt;
*2nd WD provided in July 2019&lt;br /&gt;
*3rd WD provided in Dec 2019&lt;br /&gt;
*4th WD provided in June 2020&lt;br /&gt;
*1st CD provided in March 2021&lt;br /&gt;
*2nd CD provided in May 2021&lt;br /&gt;
*DIS provided in January 2022&lt;br /&gt;
*FDIS provided in June 2022&lt;br /&gt;
*Publication in February 2023&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Note that this is an ISO standard managed by the&amp;amp;nbsp;[https://www.iso.org/committee/6935430.html PC 317 technical committee]&amp;amp;nbsp;that is chaired by Jan Schallaboek&lt;br /&gt;
&amp;lt;div&amp;gt;Further to the Seventh meeting, a proposal was made to provide a technical report on use cases. 31700 would be changed into a multipart standard&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-1 Privacy-by-design for consumer goods and servives - high level requirements&amp;lt;/div&amp;gt;&amp;lt;div&amp;gt;ISO 31700-2 Privacy-by-design for consumer goods and servives - use cases&amp;lt;br/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2:2023 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Project leader: Michelle Chibba&lt;br /&gt;
&lt;br /&gt;
Draft provided by AhG use cases: Antonio Kung (Ahg Convenor), Rae Dulmage, Peter Esisenegger, Gail Magnusson, Rusne Juozapaitene, Dorotea de Marco&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/76402.html https://www.iso.org/standard/76402.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*May 2019&amp;amp;nbsp;: request for use cases&lt;br /&gt;
*March 2020: creation of AhG on use cases&lt;br /&gt;
*April 2021: continuation of AhG on use cases&lt;br /&gt;
*September 2021: approval to create 31700-2Official start date: November 1 2018&lt;br /&gt;
*June 2022: Draft technical report&lt;br /&gt;
*February 2023: Publication&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Versions&lt;br /&gt;
| &lt;br /&gt;
*1st intenal draft provided in September 2021&lt;br /&gt;
*Draft TR provided in June 2022&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Includes 3 use case: on-line retainling, fitness company, and smart locks. Note that the last two use cases are IoT use cases&lt;br /&gt;
&amp;lt;div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
see launch event : https://www.eventbrite.co.uk/e/launch-event-iso-31700-privacy-by-design-for-consumer-goods-and-services-tickets-488718479127&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;5181 IS Security and privacy - Data provenance&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan de Meer, Xiaoyuan Bai, Ryan Ko &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines, methodology and techniques for deriving securely information denoted to as provenance metadata about data&lt;br /&gt;
assets from multiple sources, intermediaries or users.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/80971.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This is a SC 27/WG 4 project, a follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_5181_Information_technology_-_Security_and_privacy_-_Data_provenance_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 5181 Data provenance]&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in March 2023&lt;br /&gt;
*2nd WD provided in August 2023&lt;br /&gt;
*3rd WD provided in December 2023&lt;br /&gt;
*1st CD provided in June 2024&lt;br /&gt;
*2nd CD provided in November 2024&lt;br /&gt;
*3rd CD provided in March 2025&lt;br /&gt;
*DIS provided in december 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;10267 IS Methods to quantify the amount of personal information in a dataset &amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Ian Opperman, Srinivas Poosarla, Dorotea Alessandra De Marco, Erik Boucher&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
The purpose of this document is to provide guidance on the methods to quantify the amount of personal information and to help estimate how easy it might be to reidentify someone in a dataset subjected to de-identification when it contains information about the characteristics of, actions of, or relationships to, natural persons. This guidance can further help organisations make better decisions for privacy protection and for appropriate use, sharing and exchange of such data.&lt;br /&gt;
This document is a high level, principles-based advisory standard which sets out terms and concepts that can be referenced by organizations.&lt;br /&gt;
This document does not provide an estimate of how easy it is to identify someone where additional external data is accessible, nor does it provide a way to define whether data is PII or not.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
|https://www.iso.org/standard/89607.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Started in October 2024&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| This project was initially submitted and approved in ISO/IEC JTC1/SC32 Data management and interchange&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in October 2024&lt;br /&gt;
*2nd WD provided in May 2025&lt;br /&gt;
*1st CD to be providedin October 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27018 2nd Edition - IS Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Editor&lt;br /&gt;
| &lt;br /&gt;
Revision: Ramaswamy Chandramouli, Hendrik Decroos&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect personally identifiable information (PII) in line with the privacy&lt;br /&gt;
principles in ISO/IEC 29100: for the public cloud computing environment.&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies guidelines based on ISO/IEC 27002:2022, taking into&lt;br /&gt;
consideration the regulatory requirements for the protection of PII which can be applicable within the&lt;br /&gt;
context of the information security risk environment(s) of a provider of public cloud services.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private&lt;br /&gt;
companies, government entities and not-for-profit organizations, which provide information processing&lt;br /&gt;
services as PII processors via cloud computing under contract to other organizations.&lt;br /&gt;
&lt;br /&gt;
The guidelines in this document can also be relevant to organizations acting as PII controllers.&lt;br /&gt;
Hence this document is not meant to be used for certification purposes.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
[https://www.iso.org/standard/61498.html https://www.iso.org/standard/61498.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*published in 2014&lt;br /&gt;
*Revision underway&lt;br /&gt;
*DIS provided in October 2023&lt;br /&gt;
*FDIS provided in October 2024&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27045 IS Big data security and privacy — Guidelines for managing big data risks&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
Dapeng Liu, Victoria Hailey, Shiqi Li&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides guidance on how to navigate the threats that can arise during the big data&lt;br /&gt;
life cycle from the various big data characteristics that are unique to big data: volume, velocity,&lt;br /&gt;
variety, variability, volatility, veracity and value, including when using big data for the design and&lt;br /&gt;
implementation of AI systems.&lt;br /&gt;
This document can help organizations build or enhance their big data security and privacy&lt;br /&gt;
capabilities, including when using big data in the development and use of AI systems. This document&lt;br /&gt;
is applicable to all organizations that develop or use big data systems, regardless of their type, size or&lt;br /&gt;
purpose.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/88970.html https://www.iso.org/standard/88970.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
This is a SC 27/WG 4 project&lt;br /&gt;
*1sd WD was provided in July 2024&lt;br /&gt;
*2nd WD Was provided in December 2024&lt;br /&gt;
*1st CD was provided in March 2025&lt;br /&gt;
*DiS to be provided in Octboer 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27045_Big_data_security_and_privacy_-_guidelines_for_data_security_management_framework_(Started_in_April_2021,_completed_in_April_2024) PWI 27045]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27091 IS Cybersecurity and privacy - Artificial Intelligence - Privacy Protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Priya Chakraborty, Antonio Kung, Byoung-Moon Chin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for organizations to address privacy risks in artificial intelligence (AI) systems and machine learning (ML) models. The guidance in this document helps organizations identify privacy risks throughout the AI system lifecycle, and establishes mechanisms to evaluate the consequences of and treat such risks.&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations that develop or use AI systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/56582.html&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| Calendar&lt;br /&gt;
|Project started in February 2023&lt;br /&gt;
|- &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Follow-up of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_6089_Impact_of_Artificial_Intelligence_on_Security_and_Privacy_.28Started_in_September_2020.2C_Completed_in_October_2022.29 PWI 6089 Impact of Artificial Intelligence on Security and Privacy]&lt;br /&gt;
&lt;br /&gt;
Is also the counterpart of ISO/IEC 27090 Cybersecurity and privacy — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems (under development)&lt;br /&gt;
&lt;br /&gt;
*1st WD provided in May 2023&lt;br /&gt;
*2nd WD provided in October 2023&lt;br /&gt;
*3rd WD provided in December 2024&lt;br /&gt;
*1st CD provided in April 2025&lt;br /&gt;
*2nd CD provided in July 2025&lt;br /&gt;
*DIS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27555 Revision IS Guidelines on Personally Identifiable Information Deletion&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Volker Hammer, Dorotea Alessandra de Marco, Alan Shipman&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies the conceptual framework for deletion of PII. It gives guidelines for establishing organizational policies that embrace concepts presented by specifying:&lt;br /&gt;
&lt;br /&gt;
*a harmonised terminology for PII deletion,&lt;br /&gt;
*an approach for defining deletion/de-identification rules in an efficient way,&lt;br /&gt;
*a description of required documentation, and&lt;br /&gt;
*a definition of roles, responsibilities and processes.&lt;br /&gt;
&lt;br /&gt;
This document is intended to be used by organizations where PII and other personal data is being stored or processed. This document does not address:&lt;br /&gt;
&lt;br /&gt;
*specific legal provision, as given by national law or specified in contracts,&lt;br /&gt;
*specific deletion rules for particular types of PII as are to be defined by PII controllers for processing????&lt;br /&gt;
*deletion mechanisms including those for cloud storage,&lt;br /&gt;
*security of deletion mechanisms,&lt;br /&gt;
*specific techniques for de-identification of data.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/fr/standard/71673.html https://www.iso.org/fr/standard/71673.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*DIS to be provided in January 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| It is based on a German standard&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27560&amp;amp;nbsp;Structure of personally identifiable information (PII) processing records&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Jan LIndquist, Andrew Hughes, Kelvin Magtalas&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies an interoperable, open, and extensible information structure for recording information relevant to the processing of Personally Identifiable Information (PII). This document further provides guidance on the use of this information to support the:&lt;br /&gt;
&lt;br /&gt;
—	provision of a record of PII processing to another entity within or outside the organisation;&lt;br /&gt;
&lt;br /&gt;
—	provision of a PII processing record to the PII Principal in the form of a ‘Privacy Receipt’;&lt;br /&gt;
&lt;br /&gt;
—	exchange of PII processing information i.e. information on how PII is processed between information systems; and,&lt;br /&gt;
&lt;br /&gt;
—	management of the lifecycle of PII processing as based on the use of a specific lawful basis.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Comment&lt;br /&gt;
| Is a revision of ISO/IEC TS 27560, further to PWI [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27569_Personal_identifiable_information_(PII)_processing_record_information_structure_(Started_in_April_2024,_completed_in_March_2025) 27569 PII processing record information structure]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st WD to be provided in July 2025&lt;br /&gt;
*1st CD to be provided in September 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27565 IS Guidance on privacy preservation based on zero-knowledge proofs&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Patrick Curry, Srinivas Poosarla&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP&amp;lt;br/&amp;gt;functional requirements relevant to a range of different business use cases, then describes show different ZKP models can be used to meet those functional requirements securely.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/80398.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Established in October 2021&lt;br /&gt;
*1st WD provided in June 2022&lt;br /&gt;
*2nd WD provided in November 2022&lt;br /&gt;
*3rd WD provided in May 2023&lt;br /&gt;
*1st CD provided in December 2023&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to provided in April 2025&lt;br /&gt;
*FDIS to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7748_Guidance_and_practices_for_privacy_preservation_based_on_zero-knowledge_proofs_.28Started_in_April_2021.2C_completed_in_October_2021.29 PWI 7758 Guidance on privacy preservation based on zero knowledge proofs]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-1 IS Age assurance - Part 1: Framework&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions &lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88143.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in May 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in March 2024&lt;br /&gt;
*1st CD provided in July 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*Treatment of DIS still on-going&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-2 IS Age assurance - Part 2: Technical approaches and guidance for implementation&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Mark Svancarek, Denis Pinkas&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document includes guidance for considering the characteristics of various approaches and for&lt;br /&gt;
making trade-offs when selecting approaches for different users, actors and use cases. The&lt;br /&gt;
document describes different technical approaches suitable in different ecosystems for the&lt;br /&gt;
implementation of age assurance systems or of age assurance components.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Under ballot&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification] and of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27566_IS_Age_assurance_-_Part_2:_Interoperability,_technical_architecture_and_guidelines_for_use_(started_in_November_2023) PWI age assurance part 2: interoperability, technical architecture and guidelines for use])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27566-3 IS Age assurance - Part 3: Approaches to comparison or analysis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;font-size: 13px; line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tony Allen, Denis Pinkas, Mark Svancarek&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document establishes considerations for analysing, comparing or differentiating the characteristics of age assurance systems or components.&lt;br /&gt;
The document includes metrics, elements and indicators of effectiveness for age assurance systems or components&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/88147.html&lt;br /&gt;
&lt;br /&gt;
Initial title was &amp;quot;Age assurance systems – Part 3: Approaches to analysis or comparison&amp;quot; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Started in October 2023&lt;br /&gt;
*1st WD provided in December 2023&lt;br /&gt;
*2nd WD provided in July 2024&lt;br /&gt;
*3rd WD provided in April 2025&lt;br /&gt;
*1st CD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
It the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_7732_Age_verification_.28Started_in_April_2021.2C_completed_in_October_2022.29 PWI 7732 Age verification]&lt;br /&gt;
&lt;br /&gt;
Former title:  Benchmarks for benchmarking analysis&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;div class=&amp;quot;_&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27568 TS Security and privacy of digital twins&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung, Patrick Curry, Vishnu Kanhere, Mark Lizar, Srinivas Poosarla, Karim Tobich, Heung Youl Youm, Hee Bong Choi&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides a framework for organizations to address security and privacy risks in digital twin systems. This document helps organizations identify security and privacy risks throughout the digital twin systems lifecycles, and establishes mechanisms to evaluate the consequences and to treat risks.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that develop or use digital twin systems.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Request for ballot made&lt;br /&gt;
*1st WD to be provided in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Needs to liaise with on-going work in ISO/IEC JTC 1/SC 41 IoT and digital twins&lt;br /&gt;
&lt;br /&gt;
Is the result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27568_Security_and_privacy_of_digital_twins_(Started_in_October_2022) PWI 2758 Security and privacy of digital twins]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27573 IS Privacy protection of user avatar and system avatar interactions in the metaverse&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hoon Jae Lee, Hee Bong Choi, Rusne Juozapaitiene, Dae-Ki Kang, Vishnu Kanhere, Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
This document provides requirements for protecting personally identifiable information((PII) during interactions between user avatars and system avatars in the metaverse. This document identifies and classifies the PII generated and used by user avatars and system avatars and addresses privacy threats in the spaces where the avatar operates during the interactions between the user avatar and the system avatar.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
* Request for ballot initiated in March 2025&lt;br /&gt;
* 1st WD to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Result from [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27574 IS Privacy in brain-computer interface (BCI) applications&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Srinivas Poorsala, Erik Boucher, Jyoty kushwaha, Binsheng Zhang, Marta beltran Pardo&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document provides requirements and guidelines on privacy for Brain Computer Interface Applications. It provides privacy controls specific to Brain Computer Interface Applications to address the privacy risks based on the principles described in ISO/IEC 29100 and ISO/IEC 27701.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
Request for NP ballot initiated in April 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
*Result of [https://ipen.trialog.com/wiki/Completed_study_periods_and_pwis#PWI_27573_Privacy_protection_of_user_avatar_and_system_avatar_interactions_in_the_metaverse_(Started_in_October_2024) PWI]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: 18.252px;&amp;quot;&amp;gt;27701 IS Privacy information management systems — Requirements and guidances&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&amp;lt;br/&amp;gt;&lt;br /&gt;
| Alan Shipman, Heung Youl Youm&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).&lt;br /&gt;
&lt;br /&gt;
Guidance is provided to assist in the implementation of the controls in this document.&lt;br /&gt;
&lt;br /&gt;
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| https://www.iso.org/standard/85819.html&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
*A revision has been initiated in October 2022&lt;br /&gt;
*FDIS provided in June 2023&lt;br /&gt;
*New format CD provided in October 2023&lt;br /&gt;
*New DIS provided in June 2024&lt;br /&gt;
*New FDIS provided in January 2025&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;27706 2nd Edition - IS Requirements for bodies providing audit and certification of privacy information management systems&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Kimberly Lucy, Fuki Azetsu, Gigi Robinson&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006-1. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
The requirements contained in this document need to be demonstrated in terms of competence and reliability by any body providing PIMS certification, and the guidance contained in this document provides additional interpretation of these requirements for any body providing PIMS certification.&lt;br /&gt;
&lt;br /&gt;
NOTE This document can be used as a criteria document for accreditation, peer assessment or other audit processes.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| [https://www.iso.org/standard/82894.html https://www.iso.org/standard/82894.html]&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*1st CD was provided in May 2022&lt;br /&gt;
*2nd CD was provided in November 2022&lt;br /&gt;
*DIS was provided in May 2023&lt;br /&gt;
*Further to October 2023 meeting, document is being restructured&lt;br /&gt;
*DIS submitted in July 2024&lt;br /&gt;
*FDIS submitted in November 2024&lt;br /&gt;
*Publication expected in October 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
|&lt;br /&gt;
Follow-up of ISO/IEC 27006-2 TS&lt;br /&gt;
| &amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;29151 2nd Edition - IS Controls, requirements and guidance for personally identifiable information protection&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 900px&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &amp;lt;span style=&amp;quot;line-height: 20.7999992370605px&amp;quot;&amp;gt;Heung Youl Youm, Alan Shipman&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Editors for revision: Heung Youl Youm, Alan Shipman, Erik Boucher, Sungchae Park&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document specifies controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).&lt;br /&gt;
&lt;br /&gt;
In particular, this document specifies requirements and guidance based on ISO/IEC 27002, taking into consideration the controls for processing PII that can be applicable within the context of an organization's information security risk environment(s).&lt;br /&gt;
&lt;br /&gt;
This document is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII, in particular, organizations that do not establish or operate a privacy information management system.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
[https://www.iso.org/standard/62726.html https://www.iso.org/standard/62726.html]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*Preparation of revision started in September 2023&lt;br /&gt;
*1st CD provided in February 2024&lt;br /&gt;
*2nd CD provided in May 2024&lt;br /&gt;
*DIS provided in October 2024&lt;br /&gt;
*2nd DIS to be provided in April 2025&lt;br /&gt;
*FDIs to be provided in September 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| Also an ITU reference (ITU-T X.gpim)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 standards under development&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;31700-2 TR Consumer Protection - Privacy-by-design for consumer goods and services - Use cases&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| &lt;br /&gt;
Antonio Kung&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides suggestions on how to use ISO 31700-1 as well as use cases illustrating the application of ISO 31700-1.&lt;br /&gt;
&lt;br /&gt;
The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| See&amp;amp;nbsp;[https://www.iso.org/standard/91874.html]&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
*DTS to be provided in October 2025&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 27 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 7709 Security and privacy reference architecture for multi-party data fusion and mining&amp;amp;nbsp;&amp;amp;nbsp;(Started in April 2021)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&amp;lt;div&amp;gt;&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Xiaoyuan Bai, Jin Peng&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Objective&lt;br /&gt;
| &lt;br /&gt;
This document provides the followings:&lt;br /&gt;
&lt;br /&gt;
* a typical model of multi-sourced data processing and the stakeholders, and analysis the security concerns, challenges and objectives.&lt;br /&gt;
* a framework to mitigate the security challenges and concerns.&lt;br /&gt;
* detailed guidelines of the “security and privacy controls” which is one of the elements of the framework.&lt;br /&gt;
* mappings between security challenges and controls.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
* 1st PWI in June 2021&lt;br /&gt;
* 2nd PWI in September 2021&lt;br /&gt;
* 3rd PWI in January 2022&lt;br /&gt;
* 4th PWI in March 2022&lt;br /&gt;
* 5th PWI in June 2022&lt;br /&gt;
* Proposal for new project in February 2023&lt;br /&gt;
* Further to proposal PWI is restarted in April 2023&lt;br /&gt;
* 1st PWI in September 2023&lt;br /&gt;
* 2nd PWI Presentation in October 2024&lt;br /&gt;
* 3rd PWI provided in June 2025&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
Is a WG4 project&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 25863&amp;amp;nbsp;Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials (started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Editor&lt;br /&gt;
| Patrick Curry, Sal Francomacaro, Hideaki Furukawa, Denis Pinkas, Heung Youl Youm, Li Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI will explore security and privacy characteristics for digital identity wallets in the context of frameworks based on a three roles model (issuer, holder, verifier). It will also provide considerations on acceptability and interoperability.&lt;br /&gt;
Excluded characteristics of:&lt;br /&gt;
* Digital wallets dedicated exclusively to payments, transportation ticketing or handling of crypto-assets.&lt;br /&gt;
* Digital wallets supporting electronic signatures.&lt;br /&gt;
* Digital wallets handling distributed ledger technology and blockchains&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| Initial title was &amp;quot;Exploration of Digital wallets storing digital credentials&amp;quot;. During the development of the PWI the group agreed to narrow the scope of this project. The adjusted title and scope reflects this agreement. The initial scope was the following:&lt;br /&gt;
&lt;br /&gt;
''This document describes the concepts and properties necessary in a digital wallet and provides a framework for the development, management, operation and use of digital wallets managing digital identity credentials.&lt;br /&gt;
''Excluded:&lt;br /&gt;
* ''Digital wallets dedicated to other activities or types of transactions and in particular to payments, including transportation payments, or for handling crypto assets are out of the scope of this document.&lt;br /&gt;
* ''Electronic signatures&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27503 Privacy and security guidelines on intelligent travel services (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Tie Sun, Bingshen Zhang, Yueqiao Wang, Antonio Kung, Vishnu Kanhere&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This activity aims to study the general framework of an intelligent travel service system, including the relevant actors (including drivers, passengers, service providers, etc), their relationships and the data flows among them. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This activity will explore and identify:&lt;br /&gt;
•	possible use cases&lt;br /&gt;
•	practical recommendations for the collection, processing, use, storage, and deletion of PII&lt;br /&gt;
•	considerations for the trade-off between security and privacy&lt;br /&gt;
•	considerations for payment security and the safety of passengers&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 27575 Privacy for metaverse frameworks (Started in March 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Hee Bong Choi, Hoon Jae Lee, Antonio Kung, Rusne Juozapaitiene, Vishnu Kanhere, HyunDuk Shin&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This PWI aims to analysis a landscape of elements, personal identifiable information (PII), privacy threats, and privacy protection measures in the metaverse framework. The PWI provides a landscape of regulations, industry approaches and standards development in order to protect PII in the metaverse frameworks.&lt;br /&gt;
It will:&lt;br /&gt;
&lt;br /&gt;
•	Identify elements of metaverse frameworks;&lt;br /&gt;
&lt;br /&gt;
•	Outline an architectural framework(s);&lt;br /&gt;
&lt;br /&gt;
•	Describe key concepts and terminology, including definitions where possible;&lt;br /&gt;
&lt;br /&gt;
•	Define privacy problems, including PII, threats, environment; and&lt;br /&gt;
&lt;br /&gt;
•	Suggest NWIP as needed.&lt;br /&gt;
&lt;br /&gt;
Additionally, if collaboration with other SCs such as SC 24 is needed, this PWI may suggest joint work to enhance standardization harmonization; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;ISO/IEC JTC 1/SC 44 Active Preliminary Work Items&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26224 Guidelines for privacy by design of mobile information services for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Sijia Xu&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
The document supplements ISO 31700-1 with more specific&lt;br /&gt;
guidance, making it easier for the users of the document to implement and&lt;br /&gt;
understand ISO 31700-1 in the domain of mobile information services.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26225 Guidelines for privacy by design of online platforms for consumers (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Shu chen, Bingsheng Zhang&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific online platforms for consumers, based on the structure of ISO 31700-1.&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
Online platforms serve an immense consumer base and&lt;br /&gt;
consequently hold vast amounts of users’ private information. It is therefore&lt;br /&gt;
essential to leverage the platforms’ capabilities fully, guided by a philosophy of&lt;br /&gt;
respect for consumers and proactive risk prevention, to protect consumers’&lt;br /&gt;
personal-data rights to the greatest extent through privacy by design.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 26226 Usage of Privacy Enhancing Technologies in consumer privacy by design (Started in September 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Bingsheng Zhang, Antonio Kung&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides an overview of established Privacy Enhancing&lt;br /&gt;
Technologies (PETs) and analyses how these technologies can be used to meet&lt;br /&gt;
the requirements of consumer privacy by design. It is complemented by a&lt;br /&gt;
number of cross-referenced case studies providing examples on how to use&lt;br /&gt;
specific Privacy Enhancing Technologies in specific consumer domains or for&lt;br /&gt;
specific consumer product categories. It also maps the descriptions with the&lt;br /&gt;
structure of ISO 31700-1 requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document is needed to illustrate the use of PETs in the space of&lt;br /&gt;
consumer products. It highlights current application areas of PETs for consumer&lt;br /&gt;
products, along with their demonstrated effectiveness. The document will&lt;br /&gt;
provide guidance to stakeholders with a direct interest in building consumer&lt;br /&gt;
products (business manager, product owner, product architect). The guidance&lt;br /&gt;
will help these stakeholders to apply ISO 31700-1 effectively, thereby enforcing&lt;br /&gt;
ISO/IEC 29100 privacy principles.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;font-size: medium;&amp;quot;&amp;gt;PWI 31700-3 Consumer protection — Privacy by design for consumer goods and services — Part 3: Audits of privacy by design for consumer products and services (Started in April 2025)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;line-height: 20.8px; width: 900px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| Leaders&lt;br /&gt;
| &lt;br /&gt;
Kung Antonio, Choy-Harris Ingrid, Dulmage Graham Rae, Zhang Bingsheng&lt;br /&gt;
|-&lt;br /&gt;
| Scope&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance for privacy by design of specific&lt;br /&gt;
consumer mobile information services, based on the structure of ISO 31700-1&lt;br /&gt;
|-&lt;br /&gt;
| Documentation&lt;br /&gt;
| &lt;br /&gt;
This document provides guidance on managing a privacy-by-design for consumer goods and service (PCGS) audit programme, on conducting audits, and on the competence of PGCSS auditors, in addition to the guidance contained in ISO 19011.&lt;br /&gt;
&lt;br /&gt;
This document is applicable to those needing to understand or conduct internal or external audits of a PGCS or to manage an PGCS audit programme.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Calendar&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Comments&lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;color: rgb(0, 0, 0); font-family: sans-serif; line-height: 19.2px;&amp;quot;&amp;gt;Completed Preliminary Work Items or Study Periods&amp;lt;/span&amp;gt;&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
[[Completed study periods and pwis]]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2168</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2168"/>
		<updated>2026-02-25T14:03:03Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Interest group */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/licorice &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;LICORICE (EC project underway)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Interest group&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://models4privacy.org/ &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Eclipse Models for Privacy (ECLIPSE foundation interest group)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo Pripare-Large-clear.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Thumb-licorice.svg_.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2167</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2167"/>
		<updated>2026-02-24T17:44:58Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Interest group */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/licorice &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;LICORICE (EC project underway)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Interest group&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://models4privacy.org/ &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Eclipse Models for Privacy (eCLIPSE foundation interest group)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo Pripare-Large-clear.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Thumb-licorice.svg_.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2166</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2166"/>
		<updated>2026-02-24T17:44:43Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/licorice &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;LICORICE (EC project underway)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Interest group&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://models4privacy.org/ &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Evlipse Models for Privacy (eCLIPSE foundation interest group)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo Pripare-Large-clear.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Thumb-licorice.svg_.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Licorice&amp;diff=2165</id>
		<title>Licorice</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Licorice&amp;diff=2165"/>
		<updated>2026-02-24T17:43:02Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: justify;&amp;quot;&amp;gt;[[File:Thumb-licorice.svg_.png|200px|Thumb-licorice.svg_.png]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The global digital transformation driven by AI, Big Data, Metaverses, and Web3 presents both opportunities and challenges for EU citizens and businesses, including a surge in cyber-attacks and data abuse. Maintaining trust through robust data protection is crucial for securing digital services and developing EU data spaces. The EU-funded LICORICE project aims to provide highly advanced and reliable self-sovereign identity and privacy-preserving toolsets, offering tools for secure identity management and data sharing. The project will validate its results through two piloting iterations in Cyber Threat Intelligence and eHealth services, contributing to the EU’s digital sovereignty.&lt;br /&gt;
&lt;br /&gt;
Global accelerated digital transformation, shaped by disruptive technologies (AI and Big Data, Metaverses and Web3, etc.), brings both unprecedented opportunities for EU citizens and businesses and emerging and increased challenges: surge in sophisticated cyber-attacks, multifarious forms of data abuse and the corresponding growth of public concern over loss of data control or identity-related crimes. In this context, preserving trust among stakeholders with strong data protection guarantees is vital for digital services delivery in more secure online environments which benefit from the upcoming EU Digital Identity ecosystem and for fully developing EU data spaces for data exchange in federated computation scenarios.&lt;br /&gt;
With its results accurately oriented towards Digital Decade’s cardinal points and target areas, fully aligned with EU’s Digital Identity and Data Strategy, directly contributing to strengthening EU’s digital and data sovereignty and also complementing outcomes from EUDI Wallet Large Scale Pilots, LICORICE Innovation Action delivers 2 highly-advanced, reliable and trustworthy self-sovereign identity and privacy-preserving toolsets (&amp;gt;10 tools) for user-centric, cryptographically secure identity management and verifiable federated data sharing and computing. They will align with latest EUDI Wallets specifications and data space blueprints, models and frameworks to deliver high scalability and efficiency, also featuring usability and ease-of-adoption (including by SMEs), with solid open source strategy oriented to large developer communities and boosting commercial exploitation by its industrial partners. Results will be fully validated over 2 iterations of piloting, demonstrating integration of toolset prototypes in operational environments of two high-impact pilots in domains of Cyber Threat Intelligence AI-based assistance and sharing, and eHealth services and biomedical research.&lt;br /&gt;
&lt;br /&gt;
LICORICE includes 12 partners and has a 36-month duration.&lt;br /&gt;
&lt;br /&gt;
[https://cordis.europa.eu/project/id/101168311 European commission website info]&lt;br /&gt;
&lt;br /&gt;
[https://www.licorice-horizon.eu/ LICORICEE website]&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Licorice&amp;diff=2164</id>
		<title>Licorice</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Licorice&amp;diff=2164"/>
		<updated>2026-02-24T17:40:12Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: Created page with &amp;quot;&amp;lt;p style=&amp;quot;text-align: justify;&amp;quot;&amp;gt;Thumb-licorice.svg_.png&amp;lt;/p&amp;gt;  PDP4E is an innovation action that will provide software and system engineers with methods and software tools to systematically apply data protection principles in the projects they carry out, so that the products they create comply with the General Data Protection Regulation (GDPR), thus bringing the principles of Privacy and Data Protection by Design to practice.  PDP4E...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: justify;&amp;quot;&amp;gt;[[File:Thumb-licorice.svg_.png|200px|Thumb-licorice.svg_.png]]&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PDP4E is an innovation action that will provide software and system engineers with methods and software tools to systematically apply data protection principles in the projects they carry out, so that the products they create comply with the General Data Protection Regulation (GDPR), thus bringing the principles of Privacy and Data Protection by Design to practice.&lt;br /&gt;
&lt;br /&gt;
PDP4E will integrate privacy and data protection engineering functionalities into existent, mainstream software tools that are already in use by engineers, focusing on open-source tools that will be integrated in the Eclipse ecosystem, The approach will integrate methods proposed by the privacy engineering community (e.g. LINDDUN, ISO/IEC 27550 Privacy engineering), and the industry of software and system engineering tools (e.g. MUSE, PAPYRUS or OpenCert) using a model driven engineering approach. PDP4E will introduce privacy and data protection into software and system engineering disciplines (Risk Management, Requirements Engineering, Model-Driven Design, and Assurance), which drive the everyday activities of engineers.&lt;br /&gt;
&lt;br /&gt;
Results of PDP4E will be assessed by two demonstration pilots on industries where privacy and data protection are especially relevant, one on novel financial applications and services (fintech application domain) and one on big data on smart grid (smart grid application domain).&lt;br /&gt;
&lt;br /&gt;
PDP4E will promote its results in engineering communities, as Eclipse (community of software developers) or IPEN (community of stakeholders with an interest on privacy engineering). An open Alliance for Privacy and Data Protection Engineering is planned as a follow-up of the project, building on that community and the synergies among partners.&lt;br /&gt;
&lt;br /&gt;
PDP4E includes 8 partners and has a 33-month duration.&lt;br /&gt;
&lt;br /&gt;
[https://cordis.europa.eu/project/rcn/106634_en.html European commission website info]&lt;br /&gt;
&lt;br /&gt;
[https://www.pdp4e-project.eu PDP4E website]&lt;br /&gt;
&lt;br /&gt;
PDP4E is also part of the ECLIPSE community, and we have created a [https://wiki.eclipse.org/Privacy_Data-Protection_and_Trust_Worthiness_Community wiki] on privacy engineering.&amp;amp;nbsp;&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2163</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2163"/>
		<updated>2026-02-24T17:38:34Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/licorice &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;LICORICE (EC project underway)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo Pripare-Large-clear.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Thumb-licorice.svg_.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2162</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2162"/>
		<updated>2026-02-24T17:37:07Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Sponsors and Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:logo Pripare-Large-clear.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Thumb-licorice.svg_.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2161</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2161"/>
		<updated>2026-02-24T17:36:40Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Sponsors and Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Pripare-Large-clear.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File: Thumb-licorice.svg_.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2160</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2160"/>
		<updated>2026-02-24T17:35:47Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Sponsors and Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%&amp;quot; | [[File:Logo trialog 2.png|200px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 50%&amp;quot; | [[File:Logo Pripare-Large-clear.png]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 50%&amp;quot; | [[File: Thumb-licorice.svg_.png]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
	<entry>
		<id>https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2159</id>
		<title>Wiki for Privacy Standards and Privacy Projects</title>
		<link rel="alternate" type="text/html" href="https://ipen.trialog.com/?title=Wiki_for_Privacy_Standards_and_Privacy_Projects&amp;diff=2159"/>
		<updated>2026-02-24T17:35:16Z</updated>

		<summary type="html">&lt;p&gt;Antoniok: /* Sponsors and Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;lt;span style=&amp;quot;font-size:larger&amp;quot;&amp;gt;Introduction&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
The objective of this Wiki is to be a tool allowing stakeholders interested in privacy engineering and standardisation to find resources and to identify and seek harmonisation and convergence opportunities.&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Standards&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/ISO &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;Standards published or under development in ISO/IEC&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:larger;&amp;quot;&amp;gt;Projects&amp;lt;/span&amp;gt; ==&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PARIS &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PARIS (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/pdp4e &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PDP4E (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
*[https://ipen.trialog.com/wiki/PRIPARE &amp;lt;span style=&amp;quot;color:#1020AA&amp;quot;&amp;gt;PRIPARE (EC project completed)&amp;lt;/span&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size: larger;&amp;quot;&amp;gt;More on IPEN - Internet Privacy Engineering Network&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;The purpose of IPEN ([https://www.edps.europa.eu/data-protection/ipen-internet-privacy-engineering-network_en]) is to bring together developers and data protection experts with a technical background from different areas in order to launch and support projects that build privacy into everyday tools and develop new tools which can effectively protect and enhance our privacy.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
During the PEN workshop held in Leuven on June 5th 2015, it was agreed that the IPEN community would benefit from the creation of a repository of information on activities related to privacy engineering initiatives and standards. The wiki was further extended in 2016 to cover privacy engineering projects&lt;br /&gt;
&lt;br /&gt;
Since 2024, the wiki is now entirely managed by Trialog, independently of IPEN&lt;br /&gt;
&amp;lt;span style=&amp;quot;line-height: 1.6;&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;font-size:x-large&amp;quot;&amp;gt;Sponsors and Support&amp;lt;/span&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This Wiki is sponsored by ''[https://trialog.com TRIALOG]'' and supported by the [http://pripareproject.eu/ PRIPARE] project and the [https://www.licorice-horizon.eu/ LICORICE] project.&lt;br /&gt;
&lt;br /&gt;
For any request contact antonio.kung@trialog.com&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;text-align: center; width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 50%&amp;quot; | [[File:Logo trialog 2.png|100px]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 50%&amp;quot; | [[File:Logo Pripare-Large-clear.png]]&amp;lt;br/&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 50%&amp;quot; | [[File: Thumb-licorice.svg_.png]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Antoniok</name></author>
	</entry>
</feed>