Difference between revisions of "ITU Activities"

From IPEN Wiki
Jump to navigation Jump to search
Line 5: Line 5:
Two study groups could address privacy standards:
Two study groups could address privacy standards:


*SG17 security: https://www.itu.int/en/ITU-T/studygroups/2017-2020/17/Pages/default.aspx
*SG17 security: [https://www.itu.int/en/ITU-T/studygroups/2017-2020/17/Pages/default.aspx https://www.itu.int/en/ITU-T/studygroups/2017-2020/17/Pages/default.aspx]
*SG20: Internet of things (IoT) and smart cities and communities (SC&C): https://www.itu.int/en/ITU-T/studygroups/2017-2020/20/Pages/default.aspx
*SG20: Internet of things (IoT) and smart cities and communities (SC&C): [https://www.itu.int/en/ITU-T/studygroups/2017-2020/20/Pages/default.aspx https://www.itu.int/en/ITU-T/studygroups/2017-2020/20/Pages/default.aspx]


== Standards and organisations ==
== Standards and project ==


=== <span style="font-size: larger;">X.iotsec-3:&nbsp;</span>Technical framework of PII (Personally Identifiable Information) handling system in IoT environment<span style="font-size: larger;"></span> ===
=== <span style="font-size: larger;">X.iotsec-3:&nbsp;</span>Technical framework of PII (Personally Identifiable Information) handling system in IoT environment ===


{| border="1" cellspacing="1" cellpadding="1" style="width: 900px;"
{| border="1" cellspacing="1" cellpadding="1" style="width: 900px;"
Line 21: Line 21:
| Overview
| Overview
|  
|  
<span style="line-height: 20.8px;"></span>IoT devices can collect many kinds of data, and some kinds of data include PII (Personally Identifiable Information). Because the PII data is useful for several kinds of services, they can be shared with multiple service providers. It is better for users to handle own data including PII in IoT environment based on their intention. Because the situation of data usage in IoT environment with multiple service providers will be complicated, the user's intention on data usage should be reflected flexibly. For example, if the IoT platform has the following functions, the user can recognize that the collected data including PII can be controlled properly. The users can set up PII control preference. This preference includes the list of permitted data for shared by each service provider. The collected data is controlled access based on the PII control preference. Unauthorized data cannot be shared with other service providers. The users can check the history log of data sharing among the service providers. The users can understand the timing of data usage. This Recommendation will provide the technical framework of PII handling system for IoT environment to fulfil these functions.<span style="line-height: 18px;"></span>
IoT devices can collect many kinds of data, and some kinds of data include PII (Personally Identifiable Information). Because the PII data is useful for several kinds of services, they can be shared with multiple service providers. It is better for users to handle own data including PII in IoT environment based on their intention. Because the situation of data usage in IoT environment with multiple service providers will be complicated, the user's intention on data usage should be reflected flexibly. For example, if the IoT platform has the following functions, the user can recognize that the collected data including PII can be controlled properly. The users can set up PII control preference. This preference includes the list of permitted data for shared by each service provider. The collected data is controlled access based on the PII control preference. Unauthorized data cannot be shared with other service providers. The users can check the history log of data sharing among the service providers. The users can understand the timing of data usage. This Recommendation will provide the technical framework of PII handling system for IoT environment to fulfil these functions.


|-
|-
| Web pages
| Web pages
|  
|  
*Official page:&nbsp;https://www.itu.int/itu-t/workprog/wp_item.aspx?isn=14112&nbsp;
*Official page:&nbsp;[https://www.itu.int/itu-t/workprog/wp_item.aspx?isn=14112&nbsp https://www.itu.int/itu-t/workprog/wp_item.aspx?isn=14112&amp;nbsp];


|-
|-

Revision as of 13:11, 30 August 2017

ITU.png

Introduction

Two study groups could address privacy standards:

Standards and project

X.iotsec-3: Technical framework of PII (Personally Identifiable Information) handling system in IoT environment

Chair

Yutaka Miyake, Bo Yu

Overview

IoT devices can collect many kinds of data, and some kinds of data include PII (Personally Identifiable Information). Because the PII data is useful for several kinds of services, they can be shared with multiple service providers. It is better for users to handle own data including PII in IoT environment based on their intention. Because the situation of data usage in IoT environment with multiple service providers will be complicated, the user's intention on data usage should be reflected flexibly. For example, if the IoT platform has the following functions, the user can recognize that the collected data including PII can be controlled properly. The users can set up PII control preference. This preference includes the list of permitted data for shared by each service provider. The collected data is controlled access based on the PII control preference. Unauthorized data cannot be shared with other service providers. The users can check the history log of data sharing among the service providers. The users can understand the timing of data usage. This Recommendation will provide the technical framework of PII handling system for IoT environment to fulfil these functions.

Web pages
Documentation
Comments