
ISO 27555:2021
ISO 27555:2021 Information security, cybersecurity and privacy protection – Guidelines on personally identifiable information deletion
CDN $233.00
Description
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:
-    a harmonized terminology for PII deletion;
-    an approach for defining deletion rules in an efficient way;
-    a description of required documentation;
-    a broad definition of roles, responsibilities and processes.
This document is intended to be used by organizations where PII is stored or processed.
This document does not address:
-    specific legal provision, as given by national law or specified in contracts;
-    specific deletion rules for particular clusters of PII that are defined by PII controllers for processing PII;
-    deletion mechanisms;
-    reliability, security and suitability of deletion mechanisms;
-    specific techniques for de-identification of data.
Edition
1
Published Date
2021-10-08
Status
PUBLISHED
Pages
25
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:
-    a harmonized terminology for PII deletion;
-    an approach for defining deletion rules in an efficient way;
-    a description of required documentation;
-    a broad definition of roles, responsibilities and processes.
This document is intended to be used by organizations where PII is stored or processed.
This document does not address:
-    specific legal provision, as given by national law or specified in contracts;
-    specific deletion rules for particular clusters of PII that are defined by PII controllers for processing PII;
-    deletion mechanisms;
-    reliability, security and suitability of deletion mechanisms;
-    specific techniques for de-identification of data.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
CDN $233.00 Add to cart -

ISO 27001:2024 Information security, cybersecurity and privacy protection – Information security management systems – Requirements – Amendment 1: Climate action changes
CDN $0.00 Add to cart -

ISO 27402:2023 Cybersecurity – IoT security and privacy – Device baseline requirements
CDN $173.00 Add to cart -

ISO 27007:2020 Information security, cybersecurity and privacy protection – Guidelines for information security management systems auditing
CDN $312.00 Add to cart







