Already a subscriber? 

MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?

BS ISO/IEC 15944-8:2026 - TC Tracked Changes. Information technology. Business operational view - Identification of privacy protection requirements as external constraints on business transactions, 2026
- A-30458777.pdf [Go to Page]
- undefined
- Foreword
- Introduction
- 1 Scope
- 2 Normative references
- 3 Terms and definitions
- 4 Abbreviated terms
- 5 Fundamental principles and assumptions governing privacy protection requirements in business transactions involving individuals (external constraints perspective) [Go to Page]
- 5.1 General
- 5.2 Exceptions to the application of the privacy protection principles
- 5.3 Fundamental privacy protection principles [Go to Page]
- 5.3.1 General
- 5.3.2 Privacy protection principle 1: Preventing harm
- 5.3.3 Privacy protection principle 2: Accountability
- 5.3.4 Privacy protection principle 3: Identifying purposes
- 5.3.5 Privacy protection principle 4: Informed Consent
- 5.3.6 Privacy protection principle 5: Limiting collection
- 5.3.7 Privacy protection principle 6: Limiting use, disclosure and retention
- 5.3.8 Privacy Protection Principle 7: Accuracy
- 5.3.9 Privacy Protection Principle 8: Safeguards
- 5.3.10 Privacy Protection Principle 9: Openness
- 5.3.11 Principle Protection Principle 10: Individual Access
- 5.3.12 Privacy Protection Principle 11: Challenging compliance
- 5.4 Requirement for tagging (or labelling) data elements in support of privacy protection requirements
- 6 Collaboration space and privacy protection [Go to Page]
- 6.1 General
- 6.2 Basic Open-edi collaboration space: Buyer and seller
- 6.3 Collaboration space: The role of buyer (as individual), seller and regulator
- 7 Public policy requirements of jurisdictional domains [Go to Page]
- 7.1 General
- 7.2 Jurisdictional domains and public policy requirements [Go to Page]
- 7.2.1 General
- 7.2.2 Privacy protection
- 7.2.3 Person and external constraints: Consumer protection
- 7.2.4 Individual accessibility
- 7.2.5 Human rights
- 7.2.6 Privacy as a right of an “individual” and not the right of an organization or public administration
- 8 Principles and rules governing the establishment, management and use of identities of an individual [Go to Page]
- 8.1 General
- 8.2 Rules governing the establishment of personae, identifiers and signatures of an individual
- 8.3 Rules governing the assignment of unique identifiers to an individual by Registration Authorities (RAs)
- 8.4 Rules governing individual identity, authentication, recognition, and use
- 8.5 Legally recognized individual identifies (LRIIs)
- 9 Person component — Individual sub-type [Go to Page]
- 9.1 General
- 9.2 Role qualification of a Person as an individual
- 9.3 Persona and legally recognized names (LRNs) of an individual
- 9.4 Truncation of legally recognized names of individuals
- 9.5 Rules governing anonymization of individuals in a business transaction
- 9.6 Rules governing pseudonymization of personal information in a business transaction
- 10 Process component [Go to Page]
- 10.1 General
- 10.2 Planning
- 10.3 Identification
- 10.4 Negotiation
- 10.5 Actualization
- 10.6 Post-actualization
- 11 Data component [Go to Page]
- 11.1 General
- 11.2 Rules governing the role of Business Transaction Identifier (BTI) in support of privacy protection requirements
- 11.3 Rules governing state of change management of business transactions in support of privacy protection requirements
- 11.4 Rules governing records retention of personal information in a business transaction
- 11.5 Rules governing time/date referencing of personal information in a business transaction
- 12 Template for identifying privacy protection requirements on business transactions [Go to Page]
- 12.1 Introduction and basic principles
- 12.2 Template structure and contents
- 12.3 Template for specifying the scope of an Open-edi scenario
- 12.4 Consolidated template of attributes of Open-edi scenarios, roles and information bundles
- 13 Conformance statement [Go to Page]
- 13.1 General
- 13.2 Conformance to the ISO/IEC 14662 Open-edi Reference Model and the multipart ISO/IEC 15944 eBusiness standard
- 13.3 Conformance to ISO/IEC 15944-8
- Annex A (normative) Consolidated controlled vocabulary definitions and associated terms, as human interface equivalents (HIEs), with cultural adaptability: English and French language equivalency in an IT standardization context
- Annex B (normative) Consolidated set of rules in existing parts of ISO/IEC 15944 of particular relevance to privacy protection requirements as external constraints on business transactions
- Annex C (normative) Business Transaction Model (BTM): Classes of constraints
- Annex D (normative) Integrated set of information life cycle management (ILCM) principles in support of information law compliance
- Annex E (normative) Key existing concepts and definitions applicable to the establishment, management, and use of identities of a single individual
- Annex F (normative) Coded domains for specifying state change and record retention management in support of privacy protection requirements
- Annex G (informative) Abstract of ISO/IEC 15944-8
- Annex H (Informative) Exclusions to the scope of ISO/IEC 15944-8
- Annex I (Informative) Aspects not currently addressed in this document
- Bibliography [Go to Page]