{"id":426435,"date":"2024-10-20T07:02:02","date_gmt":"2024-10-20T07:02:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30470490-dc-2023\/"},"modified":"2024-10-26T13:17:54","modified_gmt":"2024-10-26T13:17:54","slug":"bsi-23-30470490-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30470490-dc-2023\/","title":{"rendered":"BSI 23\/30470490 DC 2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | HORIZONTAL_STD FUNCTION_EMC FUNCTION_ENV FUNCTION_QUA FUNCTION_SAFETY <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, abbreviations and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3.2 Abbreviations 3.3 Conventions 4 Conformance requirements 5 Considerations, architecture and requirements 5.1 Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Premises and personally identifiable information PPII 5.3 PPII parties <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.4 Privacy principles 5.4.1 Privacy principles summary 5.4.2 Consent and choice <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4.3 Purpose legitimacy and specification 5.4.4 Collection limitation 5.4.5 Data minimization <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.4.6 Use, retention and disclosure limitation 5.4.7 Accuracy and quality 5.4.8 Openness, transparency and notice <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.4.9 Individual participation and access <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Annex\u00a0A (informative)Mapping ISO\/IEC\u00a029100 to the HES gateway <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | B.1 Introduction to the permitted PPII flows <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | B.2 Local device or user to controller service module (Scenario A) <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | B.3 Controller service module to processor service module (Scenario B) <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | B.4 Processor service module to controller service module (Scenario C) <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | B.5 Controller service module to local device or user (Scenario D) <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | B.6 Local device or user to processor service module (Scenario E) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | B.7 Processor service module to local device or user (Scenario F) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | B.8 Controller service module to remote device or user (Scenario G) <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | B.9 Processor service module to remote device or user (Scenario H) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | B.10 Remote device or user not allowed viewing local device directly <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 15045-3-2. Information technology. Home Electronic System. HES Gateway Privacy Framework<\/b><\/p>\n |