This document describes a model and method to operationalize ISO/IEC 29100 privacy principles into sets of controls and functional capabilities.
- The method is described as a process following ISO/IEC/IEEE
- It is designed for use with other standards and privacy
- It supports networked, interdependent applications and
This document is intended for engineers and other practitioners developing systems controlling or processing PII.
Status: Under development
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
- ICS :
- 35.030 IT Security
ISO/IEC CD 27561.2Stage: 30.60
Got a question?
Check out our FAQs
+41 22 749 08 88
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.