ISO/IEC 29187-1:2013
(Main)Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model
Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model
ISO/IEC 29187-1:2013 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of ICT-based learning transaction where the individual has the role of an individual learner. It provides users and designers with a methodology and tools addressing privacy protection and related requirements imposed by applicable jurisdictional domains. ISO/IEC 29187-1:2013 takes the "learning operational view" (LOV) aspects based on the ISO/IEC 14662 Open-edi Reference Model (a freely available ISO standard) together with applicable ISO standards including ISO/IEC 15944-1 and ISO/IEC 15944‑5 (also available without charge) as well as many other international referenced specifications. ISO/IEC 29187-1:2013 models the requirements of jurisdictional domains as external constraints upon the creation, use, interchange, and information life cycle management of personal information. ISO/IEC 29187-1:2013 addresses the specified context of public policy requirements of jurisdictional domains controlling the use of personal information (PI). These include regulations for consumer protection, privacy protection, individual accessibility, etc. ISO/IEC 29187-1:2013 in a LET context identifies and expands upon eleven generic, primitive, international principles that have been associated with privacy protection requirements by international, regional, and UN member states. It models them with respect to the "collaboration space" of a learning transaction and commitment exchange involving an individual acting in the role of an individual learner. In a LET context, it provides principles and rules governing the establishment, management and use of identifiers of that individual, including the use of legally recognized names (LRNs), recognized individual identity (rii), and methods of non-identification, such as the use of anonymization and pseudonymization of personal information. ISO/IEC 29187-1:2013 also sets out principles governing information lifecycle management (ILCM) as well as the rules and associated coded domains for obtaining informed consent for collection, specifying state changes, records retention, record deletion and related matters in support of privacy protection requirements.
Technologies de l'information — Identification des exigences de protection privée concernant l'apprentissage, l'éducation et la formation (AÉF) — Partie 1: Cadre général et modèle de référence
General Information
Relations
Buy Standard
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 29187-1
First edition
2013-02-15
Information technology — Identification
of privacy protection requirements
pertaining to learning, education and
training (LET) —
Part 1:
Framework and reference model
Technologies de l'information — Identification des exigences de
protection privée concernant l'apprentissage, l'éducation et la formation
(AÉF) —
Partie 1: Cadre général et modèle de référence
Reference number
©
ISO/IEC 2013
© ISO/IEC 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2013 – All rights reserved
Contents Page
Foreword . vii
0 Introduction . ix
0.1 Purpose and overview . ix
0.2 Benefits of using a multipart ISO/IEC 29187 standard approach . ix
0.3 Informed consent and learning transaction . x
0.4 Use of "jurisdictional domain", jurisdiction, country . xi
0.5 Use of “Person”, “individual”, “organization”, “public administration” and “person” in
the context of a learning transaction . xii
0.6 Importance of definitions and terms . xiii
0.7 Standard based on rules and guidelines . xiv
0.8 Size of document and role of “Part 1 Framework and Reference Model” . xiv
0.9 Use of “identifier” (in a learning transaction) . xv
0.10 Use of “privacy protection” in the context of a commitment exchange and learning
transaction . xv
0.11 Organization and description of document . xv
1 Scope . 1
1.1 Statement of scope – ISO/IEC 29187 multipart standard . 1
1.2 Statement of scope – part 1: Framework and Reference Model . 1
1.3 Exclusions . 1
1.3.1 Functional services view (FSV) . 1
1.3.2 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection
requirements . 2
1.3.3 Publicly available personal information. 2
1.4 Aspects currently not addressed . 3
1.5 IT-systems environment neutrality . 6
2 Normative references . 7
2.1 ISO/IEC, ISO and ITU . 7
2.2 Referenced specifications . 9
3 Terms and definitions . 9
4 Symbols and acronyms . 39
5 Fundamental principles and assumptions governing privacy protection requirements in
learning transactions involving individual learners (external constraints perspective) . 41
5.1 Introduction and sources of requirements . 41
5.2 Exceptions to the application of the privacy protection principles . 43
5.3 Fundamental Privacy Protection Principles . 44
5.3.1 Privacy Protection Principle 1: Preventing Harm . 44
5.3.2 Privacy Protection Principle 2: Accountability . 44
5.3.3 Privacy Protection Principle 3: Identifying Purposes . 48
5.3.4 Privacy Protection Principle 4: Informed Consent . 48
5.3.5 Privacy Protection Principle 5: Limiting Collection . 50
5.3.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention . 51
5.3.7 Privacy Principle 7: Accuracy . 55
5.3.8 Privacy Protection Principle 8: Safeguards . 56
5.3.9 Privacy Protection Principle 9: Openness . 57
5.3.10 Principle 10: Individual Access . 57
5.3.11 Privacy Protection Principle 11: Challenging Compliance . 59
5.4 Requirement for tagging (or labelling) data elements in support of privacy protection
requirements . 60
6 Collaboration space and privacy protection . 63
© ISO/IEC 2013 – All rights reserved iii
6.1 Introduction .63
6.2 Privacy collaboration space: Role of individual learner, LET provider and regulator .63
6.3 Learning collaboration space (of a learning transaction) .65
7 Public policy requirements of jurisdictional domains .67
7.1 Introduction .67
7.2 Jurisdictional domains and public policy requirements .67
7.2.1 Privacy protection.68
7.2.2 Consumer protection .69
7.2.3 Individual accessibility .70
7.2.4 Human rights .71
7.2.5 Privacy as a right of an “individual” and not right of an organization or public
administration .72
7.2.6 Need to differentiate between “privacy protection” and “confidentiality”, “security”, etc. .72
8 Principles and rules governing the establishment, management and use of identities of
an individual (and “individual learner”) .73
8.1 Introduction .73
8.2 Rules governing the establishment of personae, identifiers and signatures of an
individual .74
8.3 Rules governing the assignment of unique identifiers to an individual by Registration
Authorities (RAs) .80
8.4 Rules governing individual identity (ies), authentication, recognition, and use .80
8.5 Legally recognized individual identity(ies) (LRIIs) .85
9 Person component – individual sub-type .87
9.1 Introduction .87
9.2 Role qualification of a Person as an individual (learner).87
9.3 Persona and legally recognized names (LRNs) of an individual .88
9.4 Truncation and transliteration of legally recognized names of individuals .88
9.5 Rules governing anonymization of individuals in a learning transaction .89
9.6 Rules governing pseudonymization of personal information in a learning transaction .91
10 Process component .93
10.1 Introduction .93
10.2 Planning .93
10.3 Identification .94
10.4 Negotiation .94
10.5 Actualization .94
10.6 Post-Actualization .95
11 Data (element) component of a learning transaction .97
11.1 Introduction .97
11.2 Rules governing the role of Learning Transaction Identifier (LTI) in support of privacy
protection requirements .97
11.3 Rules governing state of change management of learning transactions in support of
privacy protection requirements .98
11.4 Rules governing records retention of personal information in a learning transaction .99
11.5 Rules governing time/date referencing of personal information in a learning transaction .99
12 Conformance statement . 101
12.1 Introduction . 101
12.2 Conformance to the ISO/IEC 29187-1 Reference Model . 102
12.3 Conformance to ISO/IEC 29187-2+ parts . 102
Annex A (normative) Consolidated list of terms and definitions with cultural adaptability:
ISO English and ISO French language equivalency . 103
A.1 Introduction . 103
A.2 ISO English and ISO French .
...
INTERNATIONAL ISO/IEC
STANDARD 29187-1
First edition
2013-02-15
Information technology — Identification
of privacy protection requirements
pertaining to learning, education and
training (LET) —
Part 1:
Framework and reference model
Technologies de l'information — Identification des exigences de
protection privée concernant l'apprentissage, l'éducation et la formation
(AÉF) —
Partie 1: Cadre général et modèle de référence
Reference number
©
ISO/IEC 2013
© ISO/IEC 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2013 – All rights reserved
Contents Page
Foreword . vii
0 Introduction . ix
0.1 Purpose and overview . ix
0.2 Benefits of using a multipart ISO/IEC 29187 standard approach . ix
0.3 Informed consent and learning transaction . x
0.4 Use of "jurisdictional domain", jurisdiction, country . xi
0.5 Use of “Person”, “individual”, “organization”, “public administration” and “person” in
the context of a learning transaction . xii
0.6 Importance of definitions and terms . xiii
0.7 Standard based on rules and guidelines . xiv
0.8 Size of document and role of “Part 1 Framework and Reference Model” . xiv
0.9 Use of “identifier” (in a learning transaction) . xv
0.10 Use of “privacy protection” in the context of a commitment exchange and learning
transaction . xv
0.11 Organization and description of document . xv
1 Scope . 1
1.1 Statement of scope – ISO/IEC 29187 multipart standard . 1
1.2 Statement of scope – part 1: Framework and Reference Model . 1
1.3 Exclusions . 1
1.3.1 Functional services view (FSV) . 1
1.3.2 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection
requirements . 2
1.3.3 Publicly available personal information. 2
1.4 Aspects currently not addressed . 3
1.5 IT-systems environment neutrality . 6
2 Normative references . 7
2.1 ISO/IEC, ISO and ITU . 7
2.2 Referenced specifications . 9
3 Terms and definitions . 9
4 Symbols and acronyms . 39
5 Fundamental principles and assumptions governing privacy protection requirements in
learning transactions involving individual learners (external constraints perspective) . 41
5.1 Introduction and sources of requirements . 41
5.2 Exceptions to the application of the privacy protection principles . 43
5.3 Fundamental Privacy Protection Principles . 44
5.3.1 Privacy Protection Principle 1: Preventing Harm . 44
5.3.2 Privacy Protection Principle 2: Accountability . 44
5.3.3 Privacy Protection Principle 3: Identifying Purposes . 48
5.3.4 Privacy Protection Principle 4: Informed Consent . 48
5.3.5 Privacy Protection Principle 5: Limiting Collection . 50
5.3.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention . 51
5.3.7 Privacy Principle 7: Accuracy . 55
5.3.8 Privacy Protection Principle 8: Safeguards . 56
5.3.9 Privacy Protection Principle 9: Openness . 57
5.3.10 Principle 10: Individual Access . 57
5.3.11 Privacy Protection Principle 11: Challenging Compliance . 59
5.4 Requirement for tagging (or labelling) data elements in support of privacy protection
requirements . 60
6 Collaboration space and privacy protection . 63
© ISO/IEC 2013 – All rights reserved iii
6.1 Introduction .63
6.2 Privacy collaboration space: Role of individual learner, LET provider and regulator .63
6.3 Learning collaboration space (of a learning transaction) .65
7 Public policy requirements of jurisdictional domains .67
7.1 Introduction .67
7.2 Jurisdictional domains and public policy requirements .67
7.2.1 Privacy protection.68
7.2.2 Consumer protection .69
7.2.3 Individual accessibility .70
7.2.4 Human rights .71
7.2.5 Privacy as a right of an “individual” and not right of an organization or public
administration .72
7.2.6 Need to differentiate between “privacy protection” and “confidentiality”, “security”, etc. .72
8 Principles and rules governing the establishment, management and use of identities of
an individual (and “individual learner”) .73
8.1 Introduction .73
8.2 Rules governing the establishment of personae, identifiers and signatures of an
individual .74
8.3 Rules governing the assignment of unique identifiers to an individual by Registration
Authorities (RAs) .80
8.4 Rules governing individual identity (ies), authentication, recognition, and use .80
8.5 Legally recognized individual identity(ies) (LRIIs) .85
9 Person component – individual sub-type .87
9.1 Introduction .87
9.2 Role qualification of a Person as an individual (learner).87
9.3 Persona and legally recognized names (LRNs) of an individual .88
9.4 Truncation and transliteration of legally recognized names of individuals .88
9.5 Rules governing anonymization of individuals in a learning transaction .89
9.6 Rules governing pseudonymization of personal information in a learning transaction .91
10 Process component .93
10.1 Introduction .93
10.2 Planning .93
10.3 Identification .94
10.4 Negotiation .94
10.5 Actualization .94
10.6 Post-Actualization .95
11 Data (element) component of a learning transaction .97
11.1 Introduction .97
11.2 Rules governing the role of Learning Transaction Identifier (LTI) in support of privacy
protection requirements .97
11.3 Rules governing state of change management of learning transactions in support of
privacy protection requirements .98
11.4 Rules governing records retention of personal information in a learning transaction .99
11.5 Rules governing time/date referencing of personal information in a learning transaction .99
12 Conformance statement . 101
12.1 Introduction . 101
12.2 Conformance to the ISO/IEC 29187-1 Reference Model . 102
12.3 Conformance to ISO/IEC 29187-2+ parts . 102
Annex A (normative) Consolidated list of terms and definitions with cultural adaptability:
ISO English and ISO French language equivalency . 103
A.1 Introduction . 103
A.2 ISO English and ISO French .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.