Already a subscriber? 

MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?

ISO/IEC 29187-1:2013 Information technology - Identification of privacy protection requirements pertaining to learning, education and training (LET) - Part 1: Framework and reference model, 2013
- 0.1 Purpose and overview
- 0.2 Benefits of using a multipart ISO/IEC 29187 standard approach
- 0.3 Informed consent and learning transaction )
- 0.4 Use of "jurisdictional domain", jurisdiction, country)
- 0.5 Use of “Person”, “individual”, “organization”, “public administration” and “person” in the context of a learning transaction
- 0.6 Importance of definitions and terms)
- 0.7 Standard based on rules and guidelines
- 0.8 Size of document and role of “Part 1 Framework and Reference Model”
- 0.9 Use of “identifier” (in a learning transaction)
- 0.10 Use of “privacy protection” in the context of a commitment exchange and learning transaction
- 0.11 Organization and description of document
- 1 Scope [Go to Page]
- 1.1 Statement of scope – ISO/IEC 29187 multipart standard
- 1.2 Statement of scope – part 1: Framework and Reference Model
- 1.3 Exclusions [Go to Page]
- 1.3.1 Functional services view (FSV)
- 1.3.2 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection requirements
- 1.3.3 Publicly available personal information
- 1.4 Aspects currently not addressed)
- 1.5 IT-systems environment neutrality
- 2 Normative references [Go to Page]
- 2.1 ISO/IEC, ISO and ITU)
- 2.2 Referenced specifications
- 3 Terms and definitions
- 4 Symbols and acronyms
- 5 Fundamental principles and assumptions governing privacy protection requirements in learning transactions involving individual learners (external constraints perspective) [Go to Page]
- 5.1 Introduction and sources of requirements
- 5.2 Exceptions to the application of the privacy protection principles
- 5.3 Fundamental Privacy Protection Principles) [Go to Page]
- 5.3.1 Privacy Protection Principle 1: Preventing Harm
- 5.3.2 Privacy Protection Principle 2: Accountability
- 5.3.3 Privacy Protection Principle 3: Identifying Purposes
- 5.3.4 Privacy Protection Principle 4: Informed Consent
- 5.3.5 Privacy Protection Principle 5: Limiting Collection
- 5.3.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention
- 5.3.7 Privacy Principle 7: Accuracy
- 5.3.8 Privacy Protection Principle 8: Safeguards
- 5.3.9 Privacy Protection Principle 9: Openness
- 5.3.10 Principle 10: Individual Access
- 5.3.11 Privacy Protection Principle 11: Challenging Compliance
- 5.4 Requirement for tagging (or labelling) data elements in support of privacy protection requirements
- 6 Collaboration space and privacy protection) [Go to Page]
- 6.1 Introduction
- 6.2 Privacy collaboration space: Role of individual learner, LET provider and regulator)
- 6.3 Learning collaboration space (of a learning transaction)
- 7 Public policy requirements of jurisdictional domains [Go to Page]
- 7.1 Introduction
- 7.2 Jurisdictional domains and public policy requirements [Go to Page]
- 7.2.1 Privacy protection
- 7.2.2 Consumer protection
- 7.2.3 Individual accessibility
- 7.2.4 Human rights
- 7.2.5 Privacy as a right of an “individual” and not right of an organization or public administration)
- 7.2.6 Need to differentiate between “privacy protection” and “confidentiality”, “security”, etc.
- 8 Principles and rules governing the establishment, management and use of identities of an individual (and “individual learner”)) [Go to Page]
- 8.1 Introduction
- 8.2 Rules governing the establishment of personae, identifiers and signatures of an individual
- 8.3 Rules governing the assignment of unique identifiers to an individual by Registration Authorities (RAs)
- 8.4 Rules governing individual identity (ies), authentication, recognition, and use
- 8.5 Legally recognized individual identity(ies) (LRIIs)
- 9 Person component – individual sub-type [Go to Page]
- 9.1 Introduction
- 9.2 Role qualification of a Person as an individual (learner)
- 9.3 Persona and legally recognized names (LRNs) of an individual
- 9.4 Truncation and transliteration of legally recognized names of individuals
- 9.5 Rules governing anonymization of individuals in a learning transaction)
- 9.6 Rules governing pseudonymization of personal information in a learning transaction)
- 10 Process component) [Go to Page]
- 10.1 Introduction
- 10.2 Planning
- 10.3 Identification
- 10.4 Negotiation
- 10.5 Actualization
- 10.6 Post-Actualization
- 11 Data (element) component of a learning transaction [Go to Page]
- 11.1 Introduction)
- 11.2 Rules governing the role of Learning Transaction Identifier (LTI) in support of privacy protection requirements
- 11.3 Rules governing state of change management of learning transactions in support of privacy protection requirements
- 11.4 Rules governing records retention of personal information in a learning transaction)
- 11.5 Rules governing time/date referencing of personal information in a learning transaction
- 12 Conformance statement [Go to Page]
- 12.1 Introduction
- 12.2 Conformance to the ISO/IEC 29187-1 Reference Model
- 12.3 Conformance to ISO/IEC 29187-2+ parts [Go to Page]