Privacy

Related standards or drafts

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security testing and evaluation laboratories - Part 1: Evaluation for ISO/IEC 15408 (ISO/IEC/TS 23532-1:2021)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security testing and evaluation laboratories - Part 1: Evaluation for ISO/IEC 15408 (ISO/IEC/TS 23532-1:2021)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security testing and evaluation laboratories - Part 2: Testing for ISO/IEC 19790 (ISO/IEC/TS 23532-2:2021)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security testing and evaluation laboratories - Part 2: Testing for ISO/IEC 19790 (ISO/IEC/TS 23532-2:2021)

60.60 Standard published

CEN/CLC/JTC 13

Data protection and privacy by design and by default - Technical Report on applicability to the video surveillance industry - State of the art

60.60 Standard published

CEN/CLC/JTC 13

Data protection and privacy by design and by default - Technical Report on applicability to the video surveillance industry - State of the art

60.60 Standard published

CEN/CLC/JTC 13

Requirements for bodies providing audit and certification of information security management systems - Part 2: Privacy information management systems (ISO/IEC TS 27006-2:2021)

60.60 Standard published

CEN/CLC/JTC 13

Requirements for bodies providing audit and certification of information security management systems - Part 2: Privacy information management systems (ISO/IEC TS 27006-2:2021)

60.60 Standard published

CEN/CLC/JTC 13

Health informatics - Security and privacy requirements of EHR systems for use in conformity assessment (ISO/TS 14441:2013)

60.60 Standard published

CEN/TC 251

Information technology - Privacy capability features of current RFID technologies

60.60 Standard published

CEN/TC 225

Information technology - RFID privacy impact assessment analysis for specific sectors

60.60 Standard published

CEN/TC 225

Information technology - Analysis of privacy impact assessment methodologies relevant to RFID

60.60 Standard published

CEN/TC 225

Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe

60.60 Standard published

CEN/TC 278

CENELEC website & collaboration tool - Conditions of use and privacy policy

60.60 Standard published

CLC/Guides

Privacy of monitoring technology - Guidelines for introducing ambient and wearable monitoring technologies balancing privacy protection against the need for oversight and care

90.93 Standard confirmed

CEN/WS 102

Information technology - RFID privacy impact assessment process

90.60 Close of review

CEN/TC 225
CEN/CENELEC

Data protection and privacy by design and by default

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Data protection and privacy by design and by default

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Privacy Information Management System per ISO/IEC 27701 - Refinements in European context

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Privacy Information Management System per ISO/IEC 27701 - Refinements in European context

60.60 Standard published

CEN/CLC/JTC 13

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols

90.93 Standard confirmed

CEN/TC 224

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC 15408-4:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC 15408-4:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC 15408-5:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC 15408-5:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC 18045:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC 18045:2022)

60.60 Standard published

CEN/CLC/JTC 13

IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts (ISO/IEC 24760-1:2019)

60.60 Standard published

CEN/CLC/JTC 13

IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts (ISO/IEC 24760-1:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements (ISO/IEC 27001:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements (ISO/IEC 27001:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements - Amendment 1: Climate action changes (ISO/IEC 27001:2022/Amd 1:2024)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements - Amendment 1: Climate action changes (ISO/IEC 27001:2022/Amd 1:2024)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidance on managing information security risks (ISO/IEC 27005:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidance on managing information security risks (ISO/IEC 27005:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for bodies providing audit and certification of information security management systems - Part 1: General (ISO/IEC 27006-1:2024)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for bodies providing audit and certification of information security management systems - Part 1: General (ISO/IEC 27006-1:2024)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing (ISO/IEC 27007:2020)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing (ISO/IEC 27007:2020)

60.60 Standard published

CEN/CLC/JTC 13

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines (ISO/IEC 27701:2019)

60.60 Standard published

CEN/CLC/JTC 13

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines (ISO/IEC 27701:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including Amd 1:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including Amd 1:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy architecture framework (ISO/IEC 29101:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy architecture framework (ISO/IEC 29101:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2017)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2017)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Online privacy notices and consent (ISO/IEC 29184:2020)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Online privacy notices and consent (ISO/IEC 29184:2020)

60.60 Standard published

CEN/CLC/JTC 13

Multimedia security - Guideline for privacy protection of equipment and systems in and out of use - Part 1: General

60.60 Standard published

TC 100

Intelligent transport systems — Criteria for privacy and integrity protection in probe vehicle information systems

90.60 Close of review

ISO/TC 204

Financial services — Privacy impact assessment

90.93 Standard confirmed

ISO/TC 68/SC 9

Consumer protection — Privacy by design for consumer goods and services — Part 1: High-level requirements

60.60 Standard published

ISO/PC 317

Information technology — Home Electronic System (HES) gateway — Part 3-2: Privacy, security, and safety — Privacy framework

60.60 Standard published

ISO/IEC JTC 1/SC 25

Information technology - Home Electronic System (HES) gateway - Part 3-2: Privacy, security, and safety - Privacy framework

60.60 Standard published

ISO/IEC JTC 1/SC 25

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) on information life cycle management (ILCM) and EDI of personal information (PI)

90.92 Standard to be revised

ISO/IEC JTC 1/SC 32

Information technology — Business operational view — Part 17: Fundamental principles and rules governing Privacy-by-Design (PbD) requirements in an EDI and collaboration space context

60.60 Standard published

ISO/IEC JTC 1/SC 32

Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions

90.92 Standard to be revised

ISO/IEC JTC 1/SC 32

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services

90.93 Standard confirmed

ISO/IEC JTC 1/SC 17

Information technologies — JPEG systems — Part 4: Privacy and security

60.60 Standard published

ISO/IEC JTC 1/SC 29

Information technology — Big data reference architecture — Part 4: Security and privacy

60.60 Standard published

ISO/IEC JTC 1/SC 27

Privacy enhancing data de-identification terminology and classification of techniques

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Biometric information protection

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security management systems — Requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security management systems — Requirements — Amendment 1: Climate action changes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidance on managing information security risks

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Governance of information security

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls for the energy utility industry

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Guidelines

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Device baseline requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines on personally identifiable information deletion

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Privacy operationalisation model and method for engineering (POMME)

60.60 Standard published

ISO/IEC JTC 1/SC 27

Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy architecture framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 1: Framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for privacy impact assessment

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Online privacy notices and consent

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model

90.92 Standard to be revised

ISO/IEC JTC 1/SC 36

Information technology — Security techniques — Privacy capability assessment model

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Telecommunications and exchange between information technology systems — Requirements for local and metropolitan area networks — Part 1AE: Media access control (MAC) security — Amendment 4: MAC Privacy Protection

60.60 Standard published

ISO/IEC JTC 1/SC 6

Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security techniques — Security properties and best practices for test and evaluation of white box cryptography

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy engineering for system life cycle processes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Security and privacy in artificial intelligence use cases — Best practices

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment

60.60 Standard published

ISO/IEC JTC 1/SC 27

Guidance for developing security and privacy functional requirements based on ISO/IEC 15408

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology for learning, education and training — Learning analytics interoperability — Part 4: Privacy and data protection policies

90.93 Standard confirmed

ISO/IEC JTC 1/SC 36

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 1: Evaluation for ISO/IEC 15408

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Ontology building blocks for security and risk assessment

60.60 Standard published

ISO/IEC JTC 1/SC 27

Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology, cybersecurity and privacy protection — Cybersecurity framework development guidelines

90.60 Close of review

ISO/IEC JTC 1/SC 27

Privacy technologies — Consent record information structure

60.60 Standard published

ISO/IEC JTC 1/SC 27

Privacy protection — Privacy guidelines for smart cities

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045

60.60 Standard published

ISO/IEC JTC 1/SC 27

Intelligent transport systems — System architecture — Privacy aspects in ITS standards and systems

90.93 Standard confirmed

ISO/TC 204

Intelligent transport systems — Cooperative ITS — Part 7: Privacy aspects

60.60 Standard published

ISO/TC 204

Health informatics — Guidance on health information privacy education in healthcare organizations

60.60 Standard published

ISO/TC 215

Health informatics — Cloud computing considerations for the security and privacy of health information systems

60.60 Standard published

ISO/TC 215

Blockchain and distributed ledger technologies — Privacy and personally identifiable information protection considerations

60.60 Standard published

ISO/TC 307

Consumer protection — Privacy by design for consumer goods and services — Part 2: Use cases

60.60 Standard published

ISO/PC 317

Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment

90.92 Standard to be revised

ISO/TC 215