basic template for the development of iso and iso/iec...
TRANSCRIPT
![Page 1: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/1.jpg)
CD ISO/IEC 15944-12:2014(E)
INTERNATIONAL STANDARD
ISO/IEC15944-12
Committee Draft (CD)2014-08-31
Information technology — Business Operational View —Part 12:
Privacy protection requirements on information life cycle management (ILCM) and EDI of personal information
Technologies de l'information — Vue opérationnelle d'affaires —Partie 12: Exigences en matière de protection de la vie privée relatives à la gestion du cycle de vie de l’information (ILCM) et de l'EDI des renseignements personnels
© ISO/IEC 2014 – All rights reserved I
1
2
![Page 2: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/2.jpg)
CD ISO/IEC 15944-12:2014(E)
Contents Page
0 Introduction................................................................................................................................ ix0.1 Purpose and overview............................................................................................................... ix0.2 Use of ISO/IEC 14662 “Open-edi Reference Model” and Business Operational View (BOV)
perspective.................................................................................................................................. x0.2.1 ISO/IEC 14662 "Open-edi Reference Model"............................................................................x0.2.2 ISO/IEC 15944-1 “Business Agreement Semantic Descriptive Techniques” (“Business
Operational View (BOV”))..........................................................................................................xi0.2.3 Link to ISO/IEC 15944-5 and ISO/IEC 15944-8.......................................................................xiii0.3 Use of “Person”, “organization”, “individual” and “party” in the context of business
transaction and commitment exchange.................................................................................xiii0.4 Importance and role of terms and definitions.......................................................................xiv0.5 Standard based on rules and guidelines................................................................................xv0.6 Use of “identifier” (in a business transaction) and roles of an individual..........................xvi0.7 Use of "jurisdictional domain" in the context of privacy protection and related ILCM
requirements........................................................................................................................... xvii0.8 Use of “privacy protection” in the context of business transaction and commitment
exchange................................................................................................................................. xvii0.9 Use of set of recorded information (SRI) and set op personal information versus record,
document, message, etc.......................................................................................................xviii0.10 Organization and description of this document....................................................................xix1 Scope......................................................................................................................................... 201.1 Statement of scope................................................................................................................... 201.2 Exclusions................................................................................................................................. 211.2.1 Functional Services View (FSV)...............................................................................................211.2.2 Internal behaviour of organizations (and public administration)..........................................211.2.3 “organization Person”..............................................................................................................211.2.4 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection
requirements............................................................................................................................. 221.2.5 Publicly available personal information..................................................................................221.3 Aspects currently not addressed............................................................................................241.4 IT-systems environment neutrality..........................................................................................282 Normative references...............................................................................................................292.1 ISO/IEC, ISO and ITU................................................................................................................. 292.2 Referenced specifications........................................................................................................313 Terms and definitions...............................................................................................................314 Symbols and abbreviations.....................................................................................................645 Fundamental privacy protection principles............................................................................685.1 Introduction............................................................................................................................... 685.2 Primary sources of privacy protection principles..................................................................685.3 Key eleven (11) privacy protection principles........................................................................695.4 Privacy protection principles in the context of ILCM requirements.....................................695.4.1 Privacy protection principle 1: Preventing harm....................................................................695.4.2 Privacy protection principle 2: Accountability.......................................................................705.4.3 Privacy protection principle 3: Identifying purposes.............................................................705.4.4 Privacy protection principle 4: Informed consent..................................................................715.4.5 Privacy Protection Principle 5: Limiting Collection...............................................................715.4.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention.............................725.4.7 Privacy Protection Principle 7: Accuracy...............................................................................745.4.8 Privacy Protection Principle 8: Safeguards............................................................................755.4.9 Privacy Protection Principle 9: Openness..............................................................................765.4.10 Principle Protection Principle 10: Individual Access.............................................................765.4.11 Privacy Protection Principle 11: Challenging Compliance....................................................765.5 Requirement for tagging (or labelling) data elements in support of privacy protection
requirements............................................................................................................................. 77
II © ISO/IEC 2014 – All rights reserved
3
1
23456789101112131415161718192021
2223242526272829303132
333435
36
37
383940414243444546474849505152535455
![Page 3: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/3.jpg)
CD ISO/IEC 15944-12:2014(E)
6 Integrated set of information life cycle management (ILCM) principles in support of information law and privacy protection requirements...........................................................78
6.1 Introduction – Primary purpose of Clause 6...........................................................................786.2 Information life cycle management (ILCM) principles in support of privacy protection
requirements............................................................................................................................. 796.2.1 Compliance with privacy protection (and associated information law) requirements.......796.2.2 Direct Relevance....................................................................................................................... 806.2.3 Timely, accurate, relevant and “under control”.....................................................................806.2.4 Integrity and quality.................................................................................................................. 806.2.5 Safeguards for non-authorized disclosure requirements.....................................................806.2.6 Back-up, retention and archiving............................................................................................806.2.7 Disposition and expungement.................................................................................................816.2.8 Organizational archiving..........................................................................................................816.2.9 Historical, statistical and/or research value...........................................................................817 Rules governing the specification of ILCM aspects of personal information......................847.1 Introduction............................................................................................................................... 847.2 Rules governing establishing ILCM responsibilities for personal information...................857.3 Rules governing establishing specifications for retention of personal information –
applicable “SRI retention triggers”.........................................................................................877.4 Rules governing identification and specification of state changes of personal information917.4.1 Introduction............................................................................................................................... 917.4.2 Specification of state changes allowed to personal information..........................................927.4.3 Specification of store change type..........................................................................................957.4.4 Rules governing specification of source of state changes...................................................977.5 Rules governing disposition of personal information...........................................................988 Rules governing EDI of personal information between primary ILCM Person, i.e., the
seller, and its “agent”, “third party” and/or “regulator”......................................................1038.1 Introduction............................................................................................................................. 1038.2 ILCM rules pertaining to use of an “agent”..........................................................................1038.3 ILCM rules pertaining to use of a “third party”....................................................................1048.4 ILCM rules pertaining to involvement of a “regulator”........................................................1059 Data conversion, data migration, and data synchronization..............................................1079.1 Introduction............................................................................................................................. 1079.2 Rules governing data conversion and data migration of personal information................1079.3 Rules governing requirements for data synchronization of personal information...........10810 Conformance statement.........................................................................................................11010.1 Introduction............................................................................................................................. 11010.2 Conformance to the ISO/IEC 14662 Open-edi Reference Model and the multipart
ISO/IEC 15944 eBusiness standard.......................................................................................11010.3 Conformance to ISO/IEC 15944-12........................................................................................11010.4 Conformance by agents and third parties to ISO/IEC 15944-12..........................................110Annex A (normative) Consolidated list of terms and definitions with cultural adaptability: ISO
English and ISO French language equivalency....................................................................112A.1 Introduction............................................................................................................................. 112A.2 ISO English and ISO French..................................................................................................112A.3 Cultural adaptability and quality control...............................................................................112A.4 Organization of Annex A – Consolidated list in matrix form...............................................113A.5 List of added Part 12 terms and definitions with cultural adaptability: ISO English and ISO
French...................................................................................................................................... 114Annex B (normative) Consolidated set of rules in existing Parts of ISO/IEC 15944 of particular
relevance to privacy protection requirements as external constraints on business transactions which apply to personal information in an ILCM requirements context......120
B.1 Introduction............................................................................................................................. 120B.2 Organization of Annex B: Consolidated list in matrix form................................................120B.3 Consolidated list of rules in ISO/IEC 15944-1 pertaining to external constraints relevant to
supporting privacy protection requirements........................................................................121
© ISO/IEC 2014 – All rights reserved III
5
5657585960616263646566676869
7071727374757677787980
818283848586
87888990
919293949596
979899100101102103104
105106107108109110111
6
![Page 4: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/4.jpg)
CD ISO/IEC 15944-12:2014(E)
B.4 Consolidated list of rules in ISO/IEC 15944-2 pertaining to external constraints of relevance to supporting privacy protection requirements..................................................124
B.5 Consolidated list of rules in ISO/IEC 15944-5 pertaining to external constraints of relevance to supporting privacy protection requirements..................................................125
B.6 Consolidated list of rules in ISO/IEC 15944-7 pertaining to external constraints of relevance to supporting privacy protection requirements..................................................129
B.7 Consolidated list of rules in ISO/IEC 15944-8 pertaining to external constraints of relevance to supporting privacy protection requirements..................................................135
Annex C (normative) Linking ILCM to process phases of a business transaction.......................145C.1 Introduction............................................................................................................................. 145C.2 Rules governing linkages of ILCM process to process component of the Business
Transaction Model (BTM).......................................................................................................145C.3 Figurative overview of linking the five phases of the process component of the Business
Transaction Model (BTM) to ILCM requirements..................................................................146Annex D (normative) Generic approach to I*LCM decisions in a privacy protection requirements
context – ILCM decision template.........................................................................................148D.1 Introduction............................................................................................................................. 148D.2 Generic approach to ILCM decisions in a privacy protection requirements context........148D.2.1 Link to applicable records and retention and disposal of personal information and
“transitory records”................................................................................................................148D.2.2 Link to “post actualization” requirements............................................................................150Annex E (Informative) Generic approach to identification of properties and behaviours of
personal information as SRI transitory records and their disposition/expungement.......152E.1 Introduction............................................................................................................................. 152E.2 Definition of the concept of “SRI transitory record”............................................................153E.3 Information on examples of “SRI transitory records”.........................................................153Bibliography......................................................................................................................................... 155Abstracts................................................................................................................................................ 157
Figures..........................................................................................................................................PageFigure 1 — Open-edi environment – Open-edi Reference Model........................................................xFigure 2 — Integrated view - Business operational requirements: External constraints focus.....xiiFigure 3 — Primary sources for privacy protection principles..........................................................68
Figure C.1 Overview- linking the five phases of the process component of the Business Transaction Model (BTM) to ILCM requirements..........................................................147
Figure D.1 Decision Tree Diagram for identification and disposition of a SPI from an ILCM requirements perspective (including it being declared a transitory record”............149
Tables ........................................................................................................PageTable 1 — ISO/IEC 15944-12:01 Codes representing specification of records retention
responsibility for personal information...........................................................................86Table 2 — ISO/IEC 15944-12:02 Codes representing SRI retention triggers for retention of
personal information.........................................................................................................88Table 3 — ISO/IEC 15944-12:03 Codes representing the specification of types of record
retention period.................................................................................................................90Table 4 — ISO/IEC 15944-12:04 Codes for specifying whether state changes allowed for the
content values of SRIs containing personal information...............................................94Table 5 — ISO/IEC 15944-12:05 Codes representing store change type for SPIs (and SRIs).......96Table 6 — ISO/IEC 15944-12:06 Codes representing source of state change type ID code for
SRIs..................................................................................................................................... 97
IV © ISO/IEC 2014 – All rights reserved
7
112113114115116117118119
120121122123124125
126127128129130131132
133134135136137
138
139140
141142143144145146147148149150151152
153154155156157158159160161162163164
![Page 5: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/5.jpg)
CD ISO/IEC 15944-12:2014(E)
Table 7 — ISO/IEC 15944-12:07 Codes representing disposition types as actions of personal information (as SPIs).......................................................................................................101
Table A.1 — Columns in Table A.2....................................................................................................113Table A.2 — List of added Part 12 terms and definitions with cultural adaptability of: ISO English
and ISO French language equivalency.......................................................................114
© ISO/IEC 2014 – All rights reserved V
9
165166167168169170171172
173
10
![Page 6: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/6.jpg)
CD ISO/IEC 15944-12:2014(E)
Project Co-Editors’ Notes:
NOTE: All Project Co-Editors’ Notes below and throughout this document are temporary and apply to this CD document only. They will be removed in the preparation of the next version.
1. The Project Co-Editors Notes are based on those found in SC32/WG1 N0752 document amended as per events leading to the cancellation of the SC32/WG1, June 2014 Beijing meetings. {See SC32/WG1 N0752 and item #5 and #6 below.
2. This document replaces SC32/WG1 N725 1st WD for Part 12 as well as N0752 (see item #5 below).
3. This document implements the results of the Santa Fe, November, 2013 interim meeting of SC32/WG1, including documents SC32 WG1 N0726 and N07331, the Santa Fe resolutions re: Part 12.
4. The Santa Fe WG1 meeting basically resolved possible issues with respect to the overall approach and especially several technical aspects. The development of this CD document identified no new technical issues.
5. Based on the results of the Santa Fe meeting, the progressing of development was foreseen as:
5.1 Development of a draft CD for review, discussion and advice/decision at the scheduled Beijing 9-13 June, 2014 SC32/WG1 meeting. {see a document was prepared by the Project Co-Editors and posted as SC32/WG1 N0742, dated 2014-05-30}
5.2 The results of the Beijing meeting would be incorporated into the preparation of the CD ballot document in time for the CD Part 12 ballot to close at least two weeks prior to the start of the November, 2014 SC32/WG1 interim meeting. Following the Comment Resolution Meeting (CRM) in November, 2014 (and positive results), the next step was the preparation of the DIS ballot document for Part 12 and its posting in time for the DIS ballot to close two weeks prior to the spring 2015 SC32/WG1 Plenary meeting; and,
5.3 Since in Santa Fe, all the key technical issues were resolved, the key objective of the Project Co-Editors was the completion of necessary normative and informative text in the Clauses and Annexes in the preparation of this CD ballot document.
6 Progression of Part 12 development resulting from cancellation of SC32/WG1 Beijing meeting, June 9-13, 2014
6.1 Due to unforeseen events, key members of the SC32/WG1 were not able to attend the planned SC32/WG1 Beijing 9-13 June, 2014schedule meeting. As a result this SC32/WG1 meeting was cancelled by the Convener (See document SC32/WG1 N0752) who stated “All the items listed in the draft agenda will be discussed by following emails and the next WG1 meeting”.
6.2 Based on emails among the Convener, the Project Co-Editors and members of SC32/WG1 and comments received on the draft CD for ISO/IEC 15944-12, this CD ballot document has been prepared. It also incorporates the SC32/WG1 N0743 document “Case study – Mandatory expungement”.
6.3 Further, since at the previous Santa Fe meeting of SC32/WG1, all the key technical issues were addressed and resolved, the SC32/WG1 Convener with the agreement of the Project Co-Editors decided that a two (2) month CD ballot comment period is sufficient.
7 As was noted in the Project Co-Editors Notes for the draft CD document (N0742), the one new item is Annex Y (now Annex D) tentatively titled “Template for implementation of ILCM in support of privacy protection requirements”. Thus, as the coming next meeting of SC32/WG1 12-13 November, 2014 Toronto, meeting this new Annex D will be examined carefully. Ballot comments on this Annex are most welcome.
VI © ISO/IEC 2014 – All rights reserved
11
174
175
176177
178179180
181
182183
184185186
187
188189190
191192193194195196
197198199
200201
202203204205
206207208
209210211
212213214215216
![Page 7: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/7.jpg)
CD ISO/IEC 15944-12:2014(E)
8 Further, comments received on the draft CD document requested added information on the concept of “transitory record” along with examples. To this end text for a new Annex E (informative) has been added.
9 It is important that P-members review the coded domains presented as tables in this document and particular the entries (or rows) in each coded domain. Many of the coded domains in the Part 12 are based on those of a more generic nature as found in Part 5 and/or Part 8. IN this Part 12, they are further developed in an ILCM context and at a more granular level. P-members are therefore requested to review them in detail and recommend any changes or additions as may be required.
10 Finally, constraints on available time and resources of the Project Co-Editors for Part 12 did not yet allow for a necessary detailed review of possible applicable standards of ISO TC46/SC11 Archives/Records Management and in particular the following:
ISO 13008-12 Information and document - Digital records conversion and migration practice;
the multipart ISO 15489 – Information and document management
Part 1 (2001) – General Concepts and principles (being revised and renamed)
Part 2 (2001) Guidelines (being revised)
11 These and other relevant ISO TC46/SC11 standards are in the process of being revised. The Project Co-Editors will be making a contribution on this matter for the upcoming Toronto November, 2014 interim meeting of JTC1/SC32/WG1.
© ISO/IEC 2014 – All rights reserved VII
13
217218
219220221222223
224225226
227
228
229
230
231232233
234
14
![Page 8: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/8.jpg)
CD ISO/IEC 15944-12:2014(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 15944-12 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 32, Data management and interchange.
ISO/IEC 15944 consists of the following parts, under the general title Information technology — Business Operational View:
Part 1: Operational aspects of Open-edi for implementation
Part 2: Registration of scenarios and their components as business objects**
Part 4: Business transaction scenarios — Accounting and economic ontology**
Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints**
Part 6: Technical introduction to e-Business modelling [Technical Report]**
Part 7: eBusiness vocabulary**
Part 8: Identification of privacy protection requirements as external constraints on business transactions**
Part 9: Business transaction traceability framework for commitment exchange*
Part 10: IT-enabled coded domains as semantic components in business transactions
Part 11: Descriptive Techniques for Foundational Modelling in Open-edi*
Part 20: Linking business operational view to functional service view*
* Indicates that standard is under preparation. ** Indicates the standard is undergoing review under the “minor revision” process.
VIII © ISO/IEC 2014 – All rights reserved
15
235
236237238239240241242
243
244245246
247248
249250
251252
253
254
255
256257
258
259
260
261
262
263
264
265266
![Page 9: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/9.jpg)
CD ISO/IEC 15944-12:2014(E)
0 Introduction
Project Co-Editors’ Notes:
1. The text for Clause 0 and its sub-clauses is based on that found in Part 8. It has been amended and abridged where appropriate, as well as being placed in a Part 12 context.
2. It could be that some further additions or revisions, or deletions or additions will be made to Clause 0 and its sub-clauses. If so, these should be identified through CD ballot comments.
0.1 Purpose and overview
Modelling business transactions using scenarios and scenario components included specifying the applicable constraints on the data content using explicitly stated rules. The ISO/IEC 14662 Open-edi Reference Model identified two basic classes of constraints, "internal constraints" and "external constraints". External constraints apply to most business transactions.
Jurisdictional domains are the primary source of external constraints on business transactions. Privacy protection requirements in turn are a common requirement of most jurisdictional domains, although they may also result from explicit scenario demands from or on the parties involved in a business transaction. (Requirements for secrecy or confidentiality are not addressed in this part of ISO/IEC 15944, unless they are implicitly needed to apply privacy protection requirements to data).
This Part of ISO/IEC 15944 describes the added business semantic descriptive techniques needed to support information life cycle management (ILCM) aspects as part of privacy protection requirements when modelling business transactions using the external constraints of jurisdictional domains. ILCM aspects are central to the ability to ensure that privacy protection requirements are passed on and supported among all the parties to a business transaction using EDI.
In addition to the existing strategic directions of "portability" and "interoperability", the added strategic direction of ISO/IEC JTC1 of "cultural adaptability" is also supported in this part of ISO/IEC 15944. The external constraints of jurisdictional domains as a primary factor in choice and use of language and application of public policy are also addressed.
This standard applies to any organization which receives, creates, process, maintains, communicates, etc. personal information and in particular to those who receive, create, capture, maintain, use, store or dispose of records electronically. This standard applies to private and public sector activities of Persons irrespective of whether such activities are undertaken on a for-profit or not-for-profit basis.
This standard is intended for use by those organizations to which privacy protection requirements apply and who therefore need to ensure that the recorded information (electronic records and transactions) in their IT Systems is trustworthy, reliable and recognized as authentic. Typical users of this standard include
a) managers of private and public sector organizations;
b) IT Systems and records/information management system professionals;
c) Privacy protection officers (PPOs) and other personnel in organizations, including those responsible for risk management; and
d) legal professionals and others within an organization responsible for information law compliance by the organization.
© ISO/IEC 2014 – All rights reserved IX
17
267
268
269270
271272
273
274275276277
278279280281282
283284285286287
288289290291
292293294295
296297298
299
300
301302
303304
305
18
![Page 10: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/10.jpg)
CD ISO/IEC 15944-12:2014(E)
0.2 Use of ISO/IEC 14662 “Open-edi Reference Model” and Business Operational View (BOV) perspective1
0.2.1 ISO/IEC 14662 "Open-edi Reference Model"2
The ISO/IEC 14662 Open-edi Reference Model3 states the conceptual architecture necessary for carrying out electronic business transactions among autonomous parties. That architecture identifies and describes the need to have two separate and related views of the business transaction.
The first is the Business Operational View (BOV). The second is the Functional Service View (FSV). Figure 1 from ISO/IEC 14662:2010 illustrates the Open-edi environment. {For definitions of the terms used in Figure 1, please see Clause 3 below}
Figure 1 — Open-edi environment – Open-edi Reference Model
ISO/IEC 14662:2010, Clause 5 states:
"The intention is that the sending, by an Open-edi Party, of information from a scenario, conforming to Open-edi standards, shall allow the acceptance and processing of that information in the context of that scenario by one or more Open-edi Parties by reference to the scenario and without the need for agreement.
1 While “public administration” is one of the three distinct sub-types of Person, most of the rules in this Part applicable to “organization” also apply to “public administration”. In addition, an unincorporated seller is also deemed to function as an “organization”. Consequently, the use of “organization” throughout this part of ISO/IEC 15944 also covers “public administration”. Where it is necessary to bring forward specific rules, constraints, properties, etc., which apply specifically to “public administration”, this is stated explicitly.
2 The ISO/IEC 14462 Open-edi Reference Model serves as the basis of the 2000 Memorandum of Understanding (MOU) among ISO, IEC, ITU and the UN/ECE concerning standardization in the field of electronic business. {See http://www.itu.int//ITU-T/e-business/files/mou.pdf }
3 ISO/IEC 14662:2010 (3rd ed. E/F) "Information technology — Open-edi Reference Model/Technologies de l'information — Modèle de référence EDI-ouvert". {It is an ISO “freely available standard}
X © ISO/IEC 2014 – All rights reserved
19
306307
308
309310311
312313314
315
316
317
318319320321
2021222324
252627
2829
![Page 11: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/11.jpg)
CD ISO/IEC 15944-12:2014(E)
However, the legal requirements and/or liabilities resulting from the engagement of an organization in any Open-edi transaction may be conditioned by the competent legal environment(s) of the formation of a legal interchange agreement between the participating organizations. Open-edi Parties need to observe rule-based behaviour and possess the ability to make commitments in Open-edi, (e.g., business, operational, technical, legal, and/or audit perspectives)".
ISO/IEC 15944-1:2011 in Clause 7 "Guidelines for scoping Open-edi Scenarios" states in Clause 7.1:
"The approach taken is that of identifying the most primitive common components of a business transaction and then moving from the general to the more detailed, the simplest aspects to the more complex, from no external constraints on a business transaction to those which incorporate external constraints, from no special requirements on functional services to specific requirements, and so on".
This Part of ISO/IEC 15944 focuses on addressing commonly definable aspects of external context4 constraints that relate to information life cycle management (ILCM) in a privacy and data protection when the source is a jurisdictional domain. A useful characteristic of external constraints is that, at the sectoral level, national and international levels, etc., focal points and recognized authorities often already exist. The rules and common business practices in many sectoral areas are already known. Use of this Part of ISO/IEC 15944 (and related standards) addresses the transformation of these external constraints (business rules) into specified, registered, and re-useable scenarios and scenario components.
0.2.2 ISO/IEC 15944-1 “Business Agreement Semantic Descriptive Techniques” (“Business Operational View (BOV”))
ISO/IEC 15944-1 states the requirements of the BOV aspects of Open-edi in support of electronic business transactions. They shall be taken into account in the development of business semantic descriptive techniques for modelling e-business transactions and components thereof as re-useable business objects. They include:
commercial frameworks and associated requirements;
legal frameworks and associated requirements;
public policy requirements particularly those of a generic nature such as consumer protection, privacy, accommodation of handicapped/disabled;
requirements arising from the need to support cultural adaptability. This includes meeting localization and multilingual requirements, (e.g., as may be required by a particular jurisdictional domain or desired to provide a good, service and/or right in a particular market. Here one needs the ability to distinguish, the specification of scenarios, scenario components, and their semantics, in the context of making commitments, between:
a) the use of unique, unambiguous and linguistically neutral identifiers (often as composite identifiers) at the information technology (IT) interface level among the IT systems of participation parties on the one hand; and, on the other,
b) their multiple human interface equivalent (HIE) expressions in a presentation form appropriate to the Persons involved in the making of the resulting commitments.
Figure 2 shows an integrated view of these business operational requirements. It is based on Figure 3 from ISO/IEC 15944-1. Since the focus of Part 12 of ISO/IEC 15944 is that of external constraints for which jurisdictional domains are the primary source these primary sources have been shaded in Figure 2 below).
4 “Privacy protection” is the common set of world-wide requirement. In the European Union “data protection” is the equivalent concept mainly due to historical reasons.
© ISO/IEC 2014 – All rights reserved XI
31
322323324325326
327
328329330331
332333334335336337338
339340
341342343344
345
346
347348
349350351352353
354355356
357358
359360361
3233
34
![Page 12: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/12.jpg)
CD ISO/IEC 15944-12:2014(E)
XII © ISO/IEC 2014 – All rights reserved
Commercial Framework & Requirements
Legal Framework & Requirements
Public Policy Req’mts (Privacy protection, Consumer)
Information Technology Requirements & Standards
Sectoral (& cross-sectoral) Req’mts
Telecom-munications Req’mts & Standards
Business Transactions
(Open-edi based)
Characteristics of Open-ediRule-BasedCommitment ExchangeUnambiguous IdentificationBusiness Transaction Model (BTM)Key Components
Person
Process
Data
Business Transaction Model: Classes of ConstraintsSpecification, Identification & Classification of Open-edi scenarios (and components)FSV Business Demands on Open-edi Support InfrastructureOpen-edi Scenario Templates(For use in various applications areas such as: e-commerce, e-administration, e-business, e-logistics, e-government, e-learning, e-medicine etc.)
Sources of Requirements on the Business Operational View (BOV) aspects of Open-edi which need to be integrated and/or taken into account
Cultural Adaptability Localization & Multilingualism
(IT vs Human Interface)
Functional Services View (FSV)
ISO & Other Standards Environments
35
362
363
364
365
366
367
![Page 13: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/13.jpg)
CD ISO/IEC 15944-12:2014(E)
Figure 2 — Integrated view - Business operational requirements: External constraints focus
© ISO/IEC 2014 – All rights reserved XIII
37
368
369
370
38
![Page 14: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/14.jpg)
CD ISO/IEC 15944-12:2014(E)
In electronic business transactions, whether undertaken on a for profit or not-for-profit basis, the key element is commitment exchange among Persons made through their Decision Making Applications (DMAs) of their Information Technology Systems (IT Systems)5 acting on behalf of "Persons". "Persons" are the only entities able to make commitments6.
The Business Operational View (BOV) was therefore defined as:
“perspective of business transactions limited to those aspects regarding the making of business decisions and commitments among Persons which are needed for the description of a business transaction".
[ISO/IEC 14662:2010, 3.3]
There are three categories of Person as a role player in Open-edi, namely: (1) the Person as "individual", (2) the Person as "organization", and (3) the Person as "public administration". There are also three basic (or primitive) roles of Persons in business transactions, namely: "buyer", "seller", and "regulator". When modelling business transactions, jurisdictional domains prescribe their external constraints in the role of "regulator" and execute them as "public administration".
0.2.3 Link to ISO/IEC 15944-5 and ISO/IEC 15944-8
Part 5 of ISO/IEC 15944 focuses on external constraints the primary source of which is jurisdictional domains, at various levels. This ISO standard also identified a common class of external constraints known as “public policy”, which apply where and when the “buyer” in a business transaction is an “individual”. It identified three key sub-types, along with applicable rules; of public policy constraints, namely: “consumer protection”, “privacy protection” and “individual accessibility”7. (There are others). In addition, Part 5 of ISO/IEC 15944 specifies how and where (common) external constraints of jurisdictional domains impact the “Person”, “process”, and “data “components of the business transaction model (BTM), as introduced in Part 1 of ISO/IEC 15944.
Part 8 of ISO/IEC 15944, which is based on Part 5, focuses on providing a more detailed identification and specification of the common privacy protection requirements as they apply to any business transaction where the buyer is an individual.
This Part 12 of ISO/IEC 15944 is (a) based on both Part 5 and Part 8, (b) integrates applicable concepts and definitions, principles, rules, etc., found in both Parts 5 and Part 8; and, (c) focuses on information life cycle management (ILCM) aspects at a more granular level, i.e., that required to be able to support implementation of the same.
0.3 Use of “Person”, “organization”, “individual” and “party” in the context of business transaction and commitment exchange
Throughout this part of ISO/IEC 15944:
the use of Person with a capital "P" represents Person as a defined term, i.e., as the entity within an Open-edi Party that carries the legal responsibility for making commitment(s);
"individual", "organization", and "public administration" are defined terms representing the three common sub-types of "Person"; and,
5 See further Clause 5.2 "Functional Services View" in ISO/IEC 14662:2010 "Open-edi Reference Model" (3rd edition).
6 The text in this section is based on existing text in Section "0.3" in ISO/IEC 15944-1:2011 and ISO/IEC 14662:2010 (3rd edition).
7 See further Clause 6.3 “Jurisdictional domains and public policy requirements” in ISO/IEC 15944-5.”….. Part 5: Identification and referencing of requirements of jurisdictional domains and sources of external constraints”
XIV © ISO/IEC 2014 – All rights reserved
39
371372373374
375
376377378
379
380381382383384
385
386387388389390391392393
394395396
397398399400
401402
403
404405
406407
40
4142
4344
![Page 15: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/15.jpg)
CD ISO/IEC 15944-12:2014(E)
the words "person(s)" and/or "party (ies)" are used in their generic contexts independent of roles of "Person" as defined in the ISO/IEC 14662 and ISO/IEC 15944-1 standards. A "party" to a business transaction has the properties and behaviours of a "Person”.
In electronic business transactions, whether undertaken on a for profit or not-for-profit basis, the key element of any type of business transaction is commitment exchange among Persons made through their Decision Making Applications (DMAs) of the Information Technology Systems (IT Systems) 8 acting on behalf of "Persons". "Persons" are the only entities able to make commitments9.
There are three categories, i.e. sub-types, of Persons as players in Open-edi, namely (1) the Person as "individual", (2) the Person as "organization", and (3) the Person as "public administration". There are also three basic (or primitive) roles of Persons in business transactions, namely "buyer", "seller", and "regulator".
In modelling business transactions, jurisdictional domains prescribe their external constraints in the role of "regulator" and execute them as "public administration". {See Clause 5.4 in ISO/IEC 15944-1}
These three sub-types of Persons are also the possible Source Authorities for coded domains. On the whole, Source Authorities for coded domains are either "organizations" or "public administrations".
In this part of ISO/IEC 15944:
the use of Person with a capital "P" represents Person as a defined term, i.e. as the entity within an Open-edi Party that carries the legal responsibility for making commitment(s);
"individual", "organization", and "public administration" are defined terms representing the three common sub-types of "Person"; and,
the words "person(s)" and/or "party(ies)" are used in their generic contexts independent of roles of "Person" as defined in ISO/IEC 14662:2004 and ISO/IEC 15944-1. A "party" to a business transaction has the properties and behaviours of a "Person".
0.4 Importance and role of terms and definitions10
ISO/IEC Directives Part 2 provide for “Terms and definitions” as a “Technical normative element,” necessary for the understanding of certain terms used in the document, where the words have special, extended or technical meaning.
The ISO/IEC 15944 multipart standard sets out the processes for achieving a common understanding of the Business Operational View (BOV) from commercial, legal, ICT, public policy and cross-sectoral perspectives. It is therefore important to check and confirm that a “common understanding” in any one of these domains is also unambiguously understood as identical in the others.
This sub-clause is included in each part of ISO/IEC 15944 to emphasize that harmonized concepts and definitions (and assigned terms) in its Parts are essential to the continuity of the overall standard. Definitions and their assigned terms should be established as early as possible in the development process. Comments on any definition/term pair should address the question of changes needed to avoid possible misinterpretation. Definitions may need to be amended/improved as part of the harmonization of definitions and their assigned terms among the various parts of ISO/IEC 15944.
8 For the applicable normative elements here, see further in ISO/IEC 14662:2010, Clause 5.2 “Functional Services View”.
9 The text in this section is based on existing text in 0.3 in ISO/IEC 15944-1:2011 and ISO/IEC 14662:2010.
10 All the terms and definitions of the current editions of the ISO/IEC 14662 Open-edi Reference Model and the multipart ISO/IEC 15944 eBusiness standard have been consolidated in ISO/IEC 15944-7:2009. A primary reason for having “Terms and definitions” in a standard is because one cannot assume that there exists a common understanding, worldwide, for a specific concept. And even if one assumes that such an understanding exists, then having such a common definition in Clause 3 serves to formally and explicitly affirm (re-affirm) such a common understanding, i.e., ensure that all parties concerned share this common understanding as stated through the text of the definitions in Clause 3.
© ISO/IEC 2014 – All rights reserved XV
46
408409410
411412413414
415416417
418419
420421
422
423424
425426
427428429
430
431432433
434435436437
438439440441442443
47
48
49505152535455
56
![Page 16: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/16.jpg)
CD ISO/IEC 15944-12:2014(E)
In order to minimize ambiguity in the definitions and their associated terms, each definition and its associated term has been made available in at least one language other than English in the part in which it is introduced. In this context, it is noted that ISO/IEC 15944-7 eBusiness vocabulary already also contains human interface equivalents (HIEs) in ISO Chinese, ISO French, and ISO Russian. The designation ISO before a natural language refers to the use of that natural language in ISO standards, and has no other meaning.
Normative Annex A “Consolidated list of terms and definitions with cultural adaptability: ISO English and ISO French language equivalency” is derived from Clause 3 of each part of ISO/IEC 15944 Annex A here contains only those concepts/definitions and associated assigned terms introduced for the first time in this Part 12.
0.5 Standard based on rules and guidelines11
This part of ISO/IEC 15944 is intended to be used within and outside of the ISO and IEC by diverse sets of users having different perspectives and needs {See above Figure 2 in Clause 0.2}.
In an ISO, IEC, ISO/IEC JTC1 context, a standard is considered to be a:
"documented agreement containing technical specifications or other precise criteria to be used consistently as rules, guidelines, or definitions of characteristics, to ensure that materials, products, processes and services are fit for their purpose."12
[ISO/IEC 15944-1:2011, 3.64]
This Business Operational View (BOV) standard focuses on "other precise criteria to be used consistently as rules, guidelines, or definitions of characteristics, to ensure that materials, products, processes and services are fit for their purpose".
Open-edi is based on rules which are predefined and mutually agreed to. They are precise criteria and agreed upon requirements of business transactions representing common business operational practices and functional requirements.
Clause 5 “Characteristics of Open-edi” in ISO/IEC 15944-1:2011 defines the “Business Operational View (BOV)” type of Open-edi standards as “rule-based” standards13. Of particular relevance here is the first key characteristic of Open-edi as stated in Clause 5.1 “Actions based upon following clear, predefined rules”. It is useful to quote some key normative text of ISO/IEC 15944-1:2011 so that users of ISO/IEC 15944-5 have a clear understanding of the nature and purpose of this BOV standard.
“Open-edi requires the use of clear and pre-defined rules, principles and guidelines. These rules formally specify the role(s) of the parties involved in Open-edi and the available expected behaviour(s) of the parties as seen by other parties engaging in Open-edi. Open-edi rules are applied to:
the content of information flows; and,
11 This introductory clause is primarily based on that found in ISO/IEC 15944-1:2011, Clause 6.1.2 titled “Standard based on rules and guidelines”.
12 See entry D252, Annex D, ISO/IEC 15944-7. One can interpret "agreement" in a variety of ways. The ISO/IEC Guide 2:2004 (1.7) uses the term "consensus" which need not imply unanimity but rather “absence of sustained opposition to substantial issues…”
13 The key characteristics of Open-edi are (as stated in Clause 5, ISO/IEC 15944-1:2011, pp.12-14) are: actions based on following predefined rules; commitment of the parties involved; communications among parties are automated; parties control and maintain their states; parties act autonomously; and, multiple transactions can be supported.
The six sub-clauses of Clause 5 of ISO/IEC 15944-1:2011 describe each of these key characteristics in more detail.
XVI © ISO/IEC 2014 – All rights reserved
57
444445446447448
449450451
452
453454
455
456457458
459
460461462
463464465
466467468469470
471472473
474
5859
606162
636465666768697071
![Page 17: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/17.jpg)
CD ISO/IEC 15944-12:2014(E)
the order and behaviour of information flows themselves.
The combination of both of these provides a complete definition of the relationships among the parties since it requires them to achieve a common semantic understanding of the information exchanged. They must also have consistent generic procedural views on their interaction. Therefore, rule sets have to be agreed to in advance and captured in Open-edi scenarios. This is a major component of the agreement required among parties.”
These rules also serve as a common set of understanding bridging the varied perspectives of the commercial framework, the legal framework, the information technology framework, standardisers, consumers, etc.14
For ease of reference, common rules have been sequentially enumerated, and are presented in bold font. Where guidelines associated with a rule are provided, they are numbered sequentially after that rule and are shown in bold and italic font15. Choice of words in the rules, the guidelines and the terms and definitions are governed by maximizing the ability to map, on the one hand, to all the sources of requirements of the Business Operational View (BOV) of any e-business transaction, (e.g., commercial, legal, public policy, cultural adaptability, sectoral, etc.), frameworks of the day-to-day world of business, and, on the other hand, those pertaining to the Functional Services View (FSV) in support of BOV requirements, (e.g., that of those providing information technology and communication services in support of commitment exchange of any kind and among all parties involved in a business transaction).
0.6 Use of “identifier” (in a business transaction) and roles of an individual16
Clause 6.1.4 of ISO/IEC 15944-1:2011 focuses on the requirement for the unambiguous identification of entities in business transactions. "Unambiguous" is a key issue in business transactions because states of ambiguity and uncertainty are an anathema from commercial, legal, consumer and information technology perspectives. Issues of unambiguousness apply to all aspects of a business transaction and even more so to those which are EDI-based. Open-edi transactions anticipate that all entities are fully and clearly identified prior to the transaction.
The ISO/IEC 15944 multipart standard serves as a methodology and tool for the specification and unambiguous identification of Open-edi scenarios, scenario attributes and scenario components as re-useable elements, i.e., as re-useable business objects, in support of common business transactions. These and related objectives of interoperability and re-usability of Open-edi scenarios and scenario components for business transactions require their unambiguous identification.
ISO/IEC 15944-1 defines "unambiguous" as follows:
unambiguous
level of certainty and explicitness required in the completeness of the semantics of the recorded information interchanged that is appropriate to the goal of a business transaction
[ISO/IEC 15944-1:2011 (3.66)]
and "identifier (in business transaction)" as follows:
identifier (in business transaction)
14 The working principle here is that of "coordinated autonomy", i.e., all parties are autonomous. Therefore, the extent to which they cooperate, agree on common needs, business rules constraints, practices, etc., and reach agreement on the same in form of precise rules, terms and definitions, etc., is a key influence on the creation of necessary standards as well as common scenarios, scenario attributes and scenario components.
15 For example, “Guideline 5G2” equals the second Guideline under Rule 5.
16 This is a summary of ISO/IEC 15944-1:2011, Clause 6.1.4 "Business transactions: Unambiguous identification of entities". See also Annex C in ISO/IEC 15944-1 titled Unambiguous Identification of Entities in a Business Transaction which provides the informative and explanatory text for the rules and definitions in Clause 6.1.4.
© ISO/IEC 2014 – All rights reserved XVII
73
475
476477478479480
481482
483484485486487488489490491
492
493494495496497498
499500501502503
504
505
506507
508
509
510
74757677
78
798081
82
![Page 18: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/18.jpg)
CD ISO/IEC 15944-12:2014(E)
unambiguous, unique and a linguistically neutral value, resulting from the application of a rule-based identification process
NOTE Identifiers must be unique within the identification scheme of the issuing authority.
[ISO/IEC 15944-1:2011 (3.27)]
Thus, readers of this part of ISO/IEC 15944 should understand that the "identifier" in this part of ISO/IEC 15944 is used as a defined term as "identifier (in a business transaction)".17
0.7 Use of "jurisdictional domain" in the context of privacy protection and related ILCM requirements
The term "jurisdiction" has many possible definitions. Some definitions of “jurisdiction” have accepted international legal status while others do not. It is also common practice to equate "jurisdiction" with "country", although the two are by no means synonymous. It is also common practice to refer to states, provinces, länder, cantons, territories, municipalities, etc., as "jurisdictions", and in contract law it is customary to specify a particular court of law as having jurisdiction or a defined national body, or an international body as having jurisdiction (even if that is not legally enforceable), and so on. Finally, there are differing "legal" definitions of "jurisdiction". Readers of this part of ISO/IEC 15944 should understand that in this part of ISO/IEC 15944:
the use of the term "jurisdictional domain" represents its use as a defined term; and,
the use of the terms “jurisdiction(s)” and/or “country (ies)” represents their use in their generic contexts and do not imply that this Part of ISO/IEC 15944 has any legal effect per se.
At the same time, a set of external constraints of a jurisdictional domain lends itself to being modelled through scenarios and semantic components. For example, Annex "I" in ISO/IEC 15944-1:2011, titled, "Scenario Description Using the Open-Edi Scenario Template, Telecommunications Operations Map Example" is a scenario of an external constraint of a jurisdictional domain, i.e., the USA, that provides a business process framework for the enterprise process required for a telecommunications service provider. Here, the fact that external constraints of jurisdictional domains are a primary factor in choice of language and application of public policy are also addressed in this part of ISO/IEC 15944.
0.8 Use of “privacy protection” in the context of business transaction and commitment exchange
Jurisdictional domains such as UN member states (and/or their administrative sub-divisions), have enacted various “privacy” laws, “data protection” laws, “protection of personal information” laws, etc., (as well as pursuant regulations). Some of these sources of legal requirements focus on the protection of personal information in IT systems only, (e.g., “data protection”), while others focus on the protection of personal information irrespective of the medium18 used for the recording of personal information and/or its communication to other Persons.
In the case of personal information, this is currently defined by most jurisdictional domains to be a specific sub-set of recorded information relating to the Person as an “individual” – where the qualities of such type of Person are that they must be an identifiable, living individual. So this may only apply to some proportion of the specific role players in a business transaction (including their personae) and not others.
This part of ISO/IEC 15944 incorporates the common aspects of such laws and regulations as pertaining to privacy protection, applicable at the time of publication only. The concept of “privacy protection” also integrates these various sets of legal and regulatory requirements and does so from a public policy requirements perspective. {See below at Clause 6.3 and Clause 7}
17 Identifiers in business transactions can be simple or composite identifiers. This is dependent on (1) the rules governing "identifiers" as a rule-based process; (2) the "registration schema" used (as well as any permitted combinations of the same).
18 “Medium” is a defined concept. {See ISO/IEC 15944-1:2011, Clause 6.4. “Rules governing the data component”, and its Clause 6.4.1 “Recorded information”}.
XVIII © ISO/IEC 2014 – All rights reserved
83
511512
513
514
515516
517518
519520521522523524525
526
527528
529530531532533534535
536537
538539540541542543
544545546547
548549550551
848586
8788
![Page 19: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/19.jpg)
CD ISO/IEC 15944-12:2014(E)
It has to be borne in mind that the delivery of “privacy protection” requires action both at the business operational level (BOV) and functional services view (FSV) (or technology levels). Where human beings interact with recorded information once it has passed through an Open-edi transaction, they may have the potential to compromise technical controls (FSV) that may have been applied. It is essential that business models take account of the need to establish overarching business processes that address issues that have not been, and/or cannot be resolved by the technical FSV controls applied so as to provide the overall privacy demands of regulation that must be applied to personal data, their use, proscribed dissemination and so on. In this regard, the interplay of the BOV and FSV views of all organizations must be taken into account.
0.9 Use of set of recorded information (SRI) and set op personal information versus record, document, message, etc.
Project Co-Editors’ Notes:
1. P-member comments are requested to advise whether throughout the document one should (a) use set of recorded information (SRI) as the default and set of personal information (SPI) only where specifically required; or (b) use set of personal information (SPI) as the default and set of recorded information only when dealing with generic matters.
2. This can be decided November, 2014 at the CD ballot resolution meeting in Toronto.
The concepts of “record”, “document”, ‘data”, “message”, etc., are defined and used in both ISO standards and in differing levels of jurisdictional domains. However, multiple differing definitions exist for each of these terms in ISO, and in standards applicable legislation and related regulations. To all this polysemy issue, the unifying concept and definition of “set of recorded information” was already introduced and defined in ISO/IEC 15944-5. It is defined as follows:
set of recorded information (SRI)
recorded information of an organization or public administration, which is under the control of the same and which is treated as a unit in its information life cycle
NOTE 1 A SRI can be a physical or digital document, a record, a file, etc., that can be read, perceived or heard by a person or computer system or similar device.
NOTE 2 A SRI is a unit of recorded information that is unambiguously defined in the context of the business goals of the organization, i.e., a semantic component.
NOTE 3 A SRI can be self-standing (atomic), or a SRI can consist of a bundling of two or more SRIs into another “new” SRI. Both types can exist simultaneously within the information management systems of an organization.
[ISO/IEC 15944-5:2008, 3.137]
In Open-edi, SRIs are modelled as information bundles (IBs) and semantic components (SCs) when they are interchanged among participating parties in a business transaction. Within the IT systems of an organization, and especially within its Decision Making Applications (DMAs), the recorded information pertaining to a business transaction is usually maintained as one or more (linked) SRIs.
In order to maximize linkages between Open-edi (external behaviour) aspects and data management (internal behaviour) aspects of an organization (as well as associated ISO record management and EDIFACT standards), SRI is used as a common higher level concept, which incorporates essential attributes of the concepts of “record”, “document”, “message”, etc. as defined in various ways in existing ISO standards.
Where and when a SRI is of the nature of personal information or contains personal information privacy protection requirements apply. Within the context of privacy protection requirements and with the focus of ILCM the concept and definition of “set of personal information (SPI)” is as follows:
set of personal information (SPI)
© ISO/IEC 2014 – All rights reserved XIX
90
552553554555556557558559
560561
562
563564565566
567
568569570571572
573
574575
576577
578579
580581
582
583584585586
587588589590
591592593
594
91
![Page 20: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/20.jpg)
CD ISO/IEC 15944-12:2014(E)
set of recorded information (SRI) which is of the nature of or contains personal information
This Part 12 focuses on ILCM of personal information in support of privacy protection requirements and as such “set of personal information (SPI)” is used throughout this document while “set of recorded information (SRI) when referring to the more generic ILCM aspects.
0.10 Organization and description of this document
Project Co-Editors’ Notes:
1. The text provided below needs to be completed. This will be done following the resolution of CD ballot comments and before the issuance of the DIS ballot document.
This part of ISO/IEC 15944, i.e. Part 12, identifies basic common requirements of information life cycle management (LCM) requirements in a privacy protection context, as external constraints of jurisdictional domains, on the modelling of a business transaction through scenarios and scenario components.
[PEs to do]
.
Finally, annexes are provided for elaboration of points raised in the main body.
Annex A is a consolidated list of the definitions and their associated terms used in this part of ISO/IEC 15944 in ISO English and ISO French. As stated in the main body of this part of ISO/IEC 15944, the issue of semantics and their importance of identifying the correct interpretation across official aspects is critical.
Annex B identifies rules stated in the other Parts of ISO/IEC 15944 that are applicable to this part of ISO/IEC 15944. Annex C is common to ISO/IEC 15944-2, ISO/IEC 15944-4, ISO/IEC 15944-5 and ISO/IEC 15944-8. It summarizes the Business Transaction Model (BTM).
[PEs to do/complete ]
XX © ISO/IEC 2014 – All rights reserved
92
595
596597598
599
600
601602
603604605
606
607
608
609610611
612613614
615
616
![Page 21: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/21.jpg)
CD ISO/IEC 15944-12:2014(E)
Information technology — Business Operational View —
Part 12:Privacy protection requirements on information life cycle management (ILCM) and EDI of personal information
1 Scope
1.1 Statement of scope
Like other parts of ISO/IEC 15944 this Part 12 is based on the ISO/IEC 14662 “Information technology - Open-edi Reference Model” as well as existing Parts of ISO/IEC 15944 “Information technology – Business Operational View” which serve as its key Normative References and overall boundaries for the Scope of Part 12. Further, Part 5 and Part 8, in particular, serve as the basis for this Part 12 as they both focus on external constraints.
In this context, this Part 12 of ISO/IEC 15944:
provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in Business Operational View (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and regulatory requirements of applicable jurisdictional domains having governance over the personal information exchanged among parties to a business transaction doing so from an “Information life cycle management (ILCM) requirements perspective;
integrates existing normative elements in support of privacy and data protection requirements as are already identified in the current editions of ISO/IEC 14662 and ISO/IEC 15944-1, ISO/IEC 15944-2, ISO/IEC 15944-4, ISO/IEC 15944-5, ISO/IEC 15944-8, ISO/IEC 15944-9, and ISO/IEC 15944-10 which apply to any kind of business information concerning identifiable living individuals as buyers19 in a business transaction or whose personal information is used in transaction or any type of commitment exchange;
provides overarching operational ‘best practice’ statements for associated (and not necessarily automated) processes, procedures, practices and governance requirements that must act in support of implementing and enforcing technical mechanisms needed to support privacy/data protection requirements necessary for the implementation in Open-edi transaction environments;
identifies and provides a sample scenario and implementation (use case) for one or more ILCM use cases of privacy/data protection in business transactions; and,
provides guidelines on the need for procedural mechanisms in the event that mandatory disclosure rules of transactional information must be implemented.
19 As stated in Clauses 6.2.4 – 6.2.8, and Figure 18 of ISO/IEC 15944-1:2011, a natural person who provides a good, service and/or right is deemed to be an organization. Most jurisdictional domains also view an unincorporated activity providing a good, service and/or right to be an organization. {See further ISO/IEC 6523}
© ISO 2014 – All rights reserved 21
94
617
618619620
621
622
623624625626627
628
629630631632633634
635636637638639640
641642643644
645646
647648
959697
![Page 22: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/22.jpg)
CD ISO/IEC 15944-12:2014(E)
1.2 Exclusions20
1.2.1 Functional Services View (FSV)
This Part 12 focuses on the BOV aspects of a business transaction, and does not concern itself with the technical mechanisms needed to achieve the business requirements (the FSV aspects, including the specification of requirements of a Functional Services View (FSV) nature which include security techniques and services, communication protocols, etc.). The FSV includes any existing standard (or standards development of an FSV nature), which have been ratified by existing ISO, IEC, UN/ECE and/or ITU standards. However, this Part 12, like the other Parts of ISO/IEC 15944 is structured to identify and facilitate the need for and use of required functional services.
1.2.2 Internal behaviour of organizations (and public administration)
Excluded from the scope of this part of ISO/IEC 15944 is the application of ILCM aspects of privacy protection requirements within an organization itself. The Open-edi Reference Model, considers these to be internal behaviours of an organization and thus not germane to business transactions (which focus on external behaviours pertaining to electronic data interchange among the autonomous parties to a business transaction). As such, excluded from the scope of this part of ISO/IEC 15944 are any:
1) internal use and management of recorded information pertaining to an identifiable organization Person an organization (or public administration) within an organization; and,
2) implementation of internal information management controls, internal procedural controls or operational controls within an organization or public administration necessary for it to comply with applicable privacy requirements that may be required in observance of their lawful or contractual rights, duties and obligations as a legal entity in the jurisdictional domain(s) of which they are part.
This should not be taken to mean that an organization could not adapt this Part 12 in order to model internal behaviour if it so wished, with respect to their ILCM policies and their implementations of personal information within their organization (or public administration).
1.2.3 “organization Person”
Project Co-Editors” Note:
1. This exclusion is carried forward from Part 8. The permanent retention, i.e., archiving, of personal information of “important persons” in an organization (private or public) is recognized as important from an historical (and research) needs perspective.
2. However, from an ILCM perspective, it is often difficult at times to distinguish between (a) personal information of an natural person in his/her role as an “organization Person”; and (b) in his/her role as an “individual”. It is a common practices in (large) organization and especially public administrations to reach an agreement to archive” all the personal information of an natural person who plays a leading role in the organization (e.g., as Chairman, President, CEO, Prime Minister, Minister, etc.) into one collective archive containing both categories (a) and (b) roles of that natural person into a single archival repository with its own distinct set of rules governing access to and use of such personal information.
3. This issue is very relevant with respect to Clause 7.4 Rules governing disposition of personal information” and its associated Coded Domain. Consideration needs to be given to addressing this issue, which is very practical in nature. Perhaps as a first step, this issue could/should be addressed via the development of a “Technical Report” .as a NWI of the multipart ISO/IEC 15944 standard.
4. P-members are requested to advice ISO/IEC JTC1/SC32/WG1 on this matter (e.g., via their CD ballot comments on this document).
20 The exclusions stated here are harmonized with ISO/IEC 15944-8 on which they are based.
22 © ISO 2014 – All rights reserved
100
649
650
651652653654655656657
658
659660661662663
664665
666667668669
670671672
673
674
675676677
678679680681682683684685
686687688689
690691
101
![Page 23: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/23.jpg)
CD ISO/IEC 15944-12:2014(E)
From a public policy privacy protection requirements perspective, an “organization Person” is a “natural person” who acts on behalf of and makes commitments on behalf of the organization (or public administration) of which that natural person is an “organization part”. But, as an “organization Person”, they do not attract inherent rights to privacy from in EDI perspective. Privacy protection requirements which do apply to an organization Person are placed in an employee-employer context with associated contractual elements. In addition, some jurisdictional domains have privacy protection laws and regulations which apply specifically to employees of their public administrations.
As such, from a business transaction perspective, it is an internal behaviour of an organization, as to who makes commitments on behalf of an organization or public administration. How and why “organization Persons”, i.e., as duly designated as authorized natural person, make decisions and commitments is not germane to the scope and purpose of this Part 12 . {See further ISO/IEC 15944-1:2011, Clause 6.2 “Person and external constraints: Individual, organization, and public administration” as well as its Figure 17 “Illustration of commitment exchange versus information exchange for organization, organization part(s) and organization Person(s)”}
1.2.4 Overlap of and/or conflict among jurisdictional domains as sources of privacy protection requirements
A business transaction requires an exchange of commitments among autonomous parties. Commitment is the making or accepting of a right, an obligation, liability or responsibility by a Person. In the context of a business transaction, the making of commitments pertains to the transfer of a good, service and/or right among the Persons involved.
Consequently, it is not an uncommon occurrence, depending on the goal and nature of the business transaction, that the Persons (and parties associated) are in different jurisdictional domains, and that multiple sets of external constraints apply, and overlap will occur. It is also not an uncommon occurrence that there is overlap among such sets of external constraints and/or conflict among them. This is also the case with respect to laws and regulations of a privacy protection nature. Resolving issues of this nature is outside the scope of this part of ISO/IEC 15944.
However, modelling business transaction as scenarios and scenario components as re-useable business objects may well serve as a useful methodology for identifying specific overlaps and conflicts (thereby serving as a tool for their harmonization, if only within the context of a specific transaction).
The application of business semantic descriptive techniques to laws, regulations, etc., of jurisdictional domains and their modelling of such sets of external constraints as scenarios and scenario components is an essential step to their application in a systematic manner to (electronic) business transactions (and especially e-government, e-commerce, e-education, etc.).
Open-edi business agreement descriptive techniques methodologies can serve as a tool in the harmonization and simplification of external constraints arising from jurisdictional domains.
NOTE This Part 12 is based on the following assumptions:
1) the privacy protection requirements of the individual, as a buyer in a business transaction, are those of the jurisdictional domain in which the individual made the commitments associated with the instantiated business transaction;
2) where the seller is in a jurisdictional domain other than that of the individual, as the buyer, this edition of ISO/IEC 15944 incorporates and supports the “OECD Guidelines on the Protection of Privacy and Transborder Data Flows of Personal Data”; the EU
3) where the buyer is an “individual” also incorporates individual accessibility requirements;
4) where the buyer is an individual this also invokes consumer protection and individual accessibility requirements.
1.2.5 Publicly available personal information
Project Co-Editors Notes:
© ISO 2014 – All rights reserved 23
103
692693694695696697698
699700701702703704705
706707
708709710711
712713714715716717
718719720
721722723724
725726
727
728729730
731732733
734
735
736
737
![Page 24: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/24.jpg)
CD ISO/IEC 15944-12:2014(E)
1. This Clause requires more consideration. The text in this Clause is taken form Part 5. It needs to be re-thought in light of the EU Court decision on “mandatory expungement”. {See document SC32/WG1 N0743} In the context of Part 12 (and Part 5), what happened is that separate SRIs of personal information which were of a PAPI nature in specific local context and accessible in those contexts only were aggregated or linked via a search engine Google and now make easily accessible world-wide.
2. The Project Co-Editors welcome CD ballot comments from P-members on this matter (as well as any expert contributions).
3. This is because of the distinct possibility to ensure that PAPI related aspects are covered through existing rules, i.e., those pertaining to the fact that personal information collected and used for a specific goal may not be (re-)used for another purpose without the express consent of the individual.
Excluded from the scope of this Part of ISO/IEC 15944 is “publicly available personal information” (PAPI) and its use. In a business transaction context, the seller often does not collect personal information of this nature from the individual (particularly in the “planning phase” of the business transaction process).
For example, the seller in advertising product to the market may:
1) use personal information that is publicly available personal information, such as that found in telephone directories;
2) make use of any personal information declared to be of a public information nature by a regulation based on an law or regulation of the applicable jurisdictional domain; and, or,
3) include that which the individual itself chose to make public, (e.g., via one or more Internet based applications such as “Facebook”, “Twitter”, etc).
In a privacy protection context, publicly available personal information is defined as follows:
publicly avalable personal information (PAPI)
personal information about an individual that the individual knowingly makes or permits to be made available to the public, or is legally obtained and accessed from: (a) government records that are available to the public; or, (b) information required by law to be made available to the public
EXAMPLE 1 Examples of personal information which an individual knowingly makes or permits to be made available include public telephone directories, advertisements in newspapers, published materials, postings of a similar nature on the internet, etc.
EXAMPLE 2 Examples of government records that are publicly available include registers of individuals who are entitled to vote, buy or sell a property, or any other personal information that a jurisdictional domain requires to be publicly available, etc.
[ISO/IEC 15944-8:2012, 3,109]
Further, determining whether or not personal information is of a “PAPI” nature is also excluded from the scope of this Part of ISO/IEC 1594421.
21 For example, in July 2014, the Irish Data Protection Commissioner order closure of civil records for genealogy nature because they contained sensitive personal data available to all including birth certificates, which include date of birth, mother’s maiden name, etc., information which is frequently used as part of security questions for e-business transactions. The Irish government complied closing part of its genealogy website on 18 July, 2014. Hern, Alex. (21 July, 2014) Personal data removed from Irish Genealogy site over security fears. T he Guardian. http://www.theguardian.com/technology/2014/jul/21/ireland-shuts-government-genealogy-personal-data-concerns (Accessed 27 July, 2104).
24 © ISO 2014 – All rights reserved
105
738739740741742
743744
745746747
748749750
751
752753
754755
756757
758
759
760761762
763764765
766767768
769
770771
106107108109110111112
![Page 25: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/25.jpg)
CD ISO/IEC 15944-12:2014(E)
1.3 Aspects currently not addressed
Project Co-Editors’ Notes:
1. This is a very important Clause. It serves two purposes:
(a) To identify to users of this standard of those privacy protection aspects of an ILCM nature which are recognized as being included in the scope of this Part 12; and,
(b) To serve as the basis for future work to be undertaken as needed and resources are available.
2. JTC1/SC32 P-members are encouraged to make comments on Clause 1.3 especially if there are added “Aspects currently not addressed”.
3. NOTE: The issues identified below are not presented in any order of important. Their order basically identifies the order in which they are identified.
This Part of ISO/IEC 15944 focuses on the essential and basic aspects of ILCM aspects of privacy protection requirements. The purpose of this Clause is to identify aspects not currently addressed. These will be addressed in either:
a) an Amendment to this part of ISO/IEC 15944,
b) new editions of this part of ISO/IEC 15944,
c) through a new part of ISO/IEC 15944 (as either an international standard (IS) or a technical report (TR);
d) in a new edition of an existing part of ISO/IEC 15944 (as may be applicable),
e) through a new edition of an existing standard of ISO/IEC JTC1, or another existing ISO/IEC JTC1/SC, or ISO, IEC or ITU; and/or,
f) new standard(s) by any of the above noted ISO standards development committees.
ISO/IEC 15944-12 also does yet address the following requirements:
1) differences in equality in the use of official languages by an individual, in being informed and exercising privacy protection rights within a jurisdictional domain22;
2) interworking between ILCM aspects of privacy protection and consumer protection requirements as two sets of external constraints applicable to an individual as a buyer in a business transaction and their related SPIs;
3) more detailed information management and audit requirements pertaining to ensuring ILCM aspects of privacy protection of personal information that should be enacted by and among organizations and public administrations as parties to a business transaction;
4) more detailed rules and associated text pertaining to the BOV perspective with respect to ILCM aspects of transborder data flows of personal information;
22 This part of ISO/IEC 15944 focuses on the essential basic, i.e. primitive, aspect of jurisdictional domains as sources of external constraints. As such this edition of ISO/IEC 15944-8 does not address differences in status that may exist among official languages within a jurisdictional domain. It is not uncommon that where a jurisdictional domain has three or more official languages that not all of these have equal status. For example, for use of some official language(s) in a jurisdictional domain, there could be criteria such as “where and when numbers warrant”, “there is a significant demand for communication with and services from a public administration in that language”, etc. This impacts both the language in which personal information is recorded by an organization or public administration as well as the language of communications of the individual with the organization in a business transaction.
© ISO 2014 – All rights reserved 25
114
772
773
774
775776
777
778779
780781
782783784
785
786
787788
789
790791
792
793
794795
796797798
799800801
802803
115116117118119120121122
![Page 26: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/26.jpg)
CD ISO/IEC 15944-12:2014(E)
5) inter-operation between jurisdictional domains where they do not possess defined equivalents to their privacy protection requirements (interoperability) or where privacy protection requirements simply are different;
6) general constraints and associated rules on the sharing of personal information as transborder data flows among different jurisdictional domains including related aspects of extraterritoriality;
7) the methodology(ies) to explicitly identify which individual the personal information belongs to;
8) instances in which ILCM aspects of privacy protection requirements continue to apply to the personal information of an individual after his/her death;
In addition, from a business transaction perspective, there may be some continuity in ILCM aspects of privacy protection requirements, (e.g., those pertaining to temporal aspects of post-actualization aspects of an instantiated business transaction, (e.g., health care matters, warranties on products, service contracts, rights (including IP), etc.). Instantiated business transactions may require personal information to be retained and continue to be protected following the death of the individual.
NOTE 1 This may also include a settlement of wills, probate, investments, etc., pertaining to that individual once proved deceased.
NOTE 2 Tax information filed has 4-6 years record retention requirements in most jurisdictional domains. In some jurisdictional domains, tax matters are confidential and in others they are public. The status of personal information may change as a result of litigation and public hearings.
NOTE 3 Instantiated business transactions may require personal information to be retained and continue to be protected following the death of an individual, (e.g., many credit card agreements exist after the death of the credit card holder).
NOTE 4 One may need to have an added Clause on privacy protection of personal information on individuals consequent upon the death of the individual.
9) this Part of ISO/IEC 15944 does not address the question of negotiated consent with respect to ILCM aspects, but rather considers the simplest case, that a scenario may be registered which includes a specific form of consent within it;
10) the use of biological characteristics and attributes of an individual which require the physical presence of an individual and are physically “taken” from an individual in a particular context and for a specified role action of an individual;
These include the use of biometrics, biological (such as hair, blood, DNA samples), dentistry records, etc.
11) the application of the rights of individuals who are disabled as stated in the “UN Convention on the Rights of Persons with Disabilities” (2006)23;
Of particular importance here is that this UN Convention takes as its basis the need to support individuals with disabilities to be a fully functioning member of society means that information necessary for these individuals to be able to make commitments including the undertaking of business transactions shall be made available in a form and format so that the semantics are fully communicated, the individual is able to have informed consent, etc.
12) this Part of ISO/IEC 15944 does not address the role of an “ombudsperson”, “Privacy Commissioner”, a “Data Protection Commissioner”, etc., who serves as an independent adjudicator of complaints and
23 Most, if not all, of the jurisdictional domains of the P-members of ISO/IEC JTC1 are signatories to this UN Convention and are enacting the requirements of this UN Convention into their domestic legislation. A useful standard from both an Open-edi and individual accessibility requirements perspective is ISO/IEC 20016-1:2014 “ITLET – Language accessibility and human interface equivalencies (HIEs) in e-learning applications – Part 1: Framework and reference model for semantic interoperability”.
26 © ISO 2014 – All rights reserved
124
804805806
807808
809
810811
812813814815816
817818
819820821
822823824
825826
827828829
830831832
833834
835836
837838839840841
842843
125126127128129
![Page 27: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/27.jpg)
CD ISO/IEC 15944-12:2014(E)
ensures compliance with ILCM related privacy protection requirements (including of internally of the organization or public administration themselves);
Many jurisdictional domains provide for the role of an ombudsperson which may be a role similar in application to public administration.
13) detailed rules pertaining to the use of agents and/or third parties by a seller in a business transaction
This includes their qualification and assurance of compliance with applicable privacy protection requirements for the personal information pertaining to a business transaction.
14) an agent acting on behalf of an individual
An individual may request an agent to act on its behalf and this may or may not include the individual to require the agent not to reveal the individual identity or any personal information about the individual, i.e., as an anonymous “client” of the agent.
15) detailed rules governing the requirement to tag (or label) at the data elements (or field) level which form part of personal information of an individual generally as is required for as the business transactions(s) and its associated BTI(s) as needed to support applicable ILCM requirements;
16) ICT and other service providers
It is presumed that any ICT (or other) services provider which is under contract to provide ICT services to an organization or public administration (which has personal information under its control) shall not access or use such personal information processed as part of its services offering to that organization, unless it has a formal contractual arrangement to do so, in compliance with applicable privacy protection requirements.
17) data mining 24 and data brokers
It is also presumed that an organization shall ensure that any data mining activities undertaken by itself (or via an agent or third party on its behalf) shall be in compliance with applicable privacy protection requirements, and not involve any secondary use or any other use of personal information for which the individual(s) concerned have not provided explicitly informed consent. In addition, the whole area pertaining to “data brokers’ requires more detailed examination25.
18) “cookies”
A “cookie” is packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server. Also known as an HTTP cookie, web cookie or browser cookie, this small piece of data is stored on the user's browser.
On the whole, a “cookie” is of the nature of a set of personal information(SPI) and at a primitive level is one of either two types, namely (a) that of the nature of (a) a transitory record” (See further below Annex E blow re “transitory Records”); or (b) of the nature of a “permanent record”. In this context from an ILCM perspective and in a privacy protection requirements context, there is a distinction between (a) a “session cookie”; and (b) a “persistent cookie”. A “session cookie” is of the nature of a
24 One recent variant of “data mining” is that of “Big Data” where vast quantities of data are aggregated to be analyzed or “mined” to achieve specific objectives such as targeted marketing to identified specific individuals. Privacy protection requirements still apply. See further the SC32/WG1 N0745 document titled “Timely, accurate and relevant data only: Privacy protection requirements on Big Data” prepared for the JTC1/SC32 Open Forum on Big Data”, 12 June, 2014, Beijing by Mr. Wenfeng Sun and Dr. Jake V.Th. Knoppers.
25 Examples of major data brokers include Acxiom, CoreLogic, Datalogix, ID Analytics, and Intelius. The focus of data brokers is consumer data (basically both the actual and derived data on individuals). On 27 May, 2014, the US Federal Trade Commission (FTC) released a study of data brokers titled “Big Data: A Call for Transparency and Accountability”. One conclusion of this study is the FTC called for the US Congress to enact legislation that would enable consumers to learn of the existence and activities of data brokers, provide consumers information on what data is being held about them, allow for an opt out option, etc.
© ISO 2014 – All rights reserved 27
131
844845
846847
848
849850
851
852853854
855856857
858
859860861862863
864
865866867868869
870
871872873874
875876877878879
132133134135136
137138139140141142
![Page 28: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/28.jpg)
CD ISO/IEC 15944-12:2014(E)
transitory record as it exists only in temporary memory while the user navigates the website. When the expiry date or validity interval is not set at cookie creation time, a session cookie is created. Web browsers normally delete session cookies when the user closes the browser. A “persistent cookie remains after the user session is closed. It has a Manage which can be reset ever time the website is used, which is why they are also called “tracking cookies”. Because cookies do cause security concerns, some users set their browser to always block cookies.
A major concern about persistent or tracking cookies is that of them supporting applicable privacy protection requirements and ensuring .individual anonymity of the individual user, especially where these include cookies collected and maintained by the seller, its agent(s) and third party(ies) 26
19) formal Conformance Statements
Clause 13 below deals with conformance requirements at the most primitive level only. More detailed conformance statements with associated rules and procedures are required in implementation. It is also necessary to ensure that any such conformance statement, i.e., declaration by an organization or public administration is “verifiable”.
20) Open-edi metadata elements need to support and mange ILCM for SPIs in support of privacy protection requirements
This 1st edition of Part 12 identifies, but not yet explicitly define and specify the Open-edi metadata elements needed to support ILCM requirements for SPIs in a business transaction needed to support privacy protection requirements (as well as associated Open-edi metadata element requirements. For example, this Part 12 (as well as other Parts of ISO/IEC 15944 include requirements of the nature which require the provision of associated metadata element information for scenarios, scenario components (including IDs for roles, IBs, SCs,, etc), SRIs, SPIs, etc. Here is is noted that Open-edi standards, including this Part 12 make extensive use of coded domains. It is
21) linkages and similarities between privacy protection and consumer protection requirements
Many of the external constraints pertaining to personal information of a privacy protection nature in a business transaction are similar to consumer protection requirements.
22) Personal information (as SPIs) resulting from business transactions being retained and used for statistical, historical or research purposes, i.e., instead of being disposed (expunged) at end of its retention period.
In the 1st edition of Part 12 this issue is addressed only in a very generic and primitive matter (see Clause 7.n below). On the whole, the issue is associated with the interaction of privacy protection requirements with other information law. Further the issue of ensuring individual anonymity for SPIs being used or retained for historical or research purposes is not yet addressed.
Project Co-Editors’ Notes:
1) This issue is not unique to Part 12 but applies to most of the Parts of ISO/IEC 15944.
2) It is recommended that rather than addressing this issue, which is urgent from a Part 12 perspective, that JTC1/SC32/WG1 consider at its Toronto, Canada, November, 2014 interim meeting to the launching a short “study period”, i.e., with a draft document to be completed prior to the 2015 JTC1/SC32/WG1 Plenary meeting, with as objective the development of a document which identifies in matrix form from a data interchange, i.e., Open-edi as well as identified external constraints perspective (including external constraints which impact internal constraints), any and all sets of content values of the nature of “data elements”, “metadata elements”, etc. currently already identified
26 Text here is based on that of the Oxford Dictionary and the Wikipedia entry for “HTTP cookie”. The US FTC in its report and recommendation to the US Congress (see ftnt. 25 above) also expressed concern about cookies and in particularly the practice of “onboarding” which is the practices of data brokers add offline data to a cookie. The primary purpose here is to enable advertisers to target an individual consumer practically anywhere on the Internet.
28 © ISO 2014 – All rights reserved
144
880881882883884885
886887888
889
890891892893
894895
896897898899900901902
903
904905
906907908
909910911912
913
914
915916917918919920921
145146147148
![Page 29: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/29.jpg)
CD ISO/IEC 15944-12:2014(E)
in existing ISO/IEC 14882 and the multipart the multipart ISO/IEC 15944oset of existing and under development series of standards.
23) Changes in jurisdictional domain(s) of parties to a business transaction (including renaming of the same physical/geographical location)
Project Co-Editors’ Notes:
1. It may well be that during the lifetime of a business transaction that the physical location of the jurisdictional domain of the buyer, seller, regulator undergoes a change, i.e., even though the physical/geographical location of the primary parties to a business transaction, i.e., the seller or buyer, has not changed but that of the regulator has.
2. Such changes in jurisdictional domain can be (a) anticipated/planned for or “be sudden” and unforeseen; (b) involve the buyer and/or seller (being location geographically/physically in the same jurisdictional domain; (c) involve a change in jurisdictional domain, etc.
3. As a result that was previously a common jurisdictional domain (and associated set of common external constraints) has been changed, i.e., either the buyer or the seller could suddenly find themselves in different jurisdiction domains along with possible differing external constraints. A key example is where (a) the nature of the good, service and/or right which is the goal of a business transaction has a post-actualization phase (of several years); and, (b) the buyer is an individual and privacy protection requirements apply.
4. A related aspect is where a jurisdictional domain joins a set of other jurisdictional domains, (e.g., the European Union, a new free trade “agreement”) which impacts either/or (a) applicable external constraints; (b) privacy protection requirements.
5. In an ISO/IEC 14662 Open-edi and ISO /IEC 15944 context, issues of this nature can be addressed in a systematic nature (particularly through the use of a coded domain) either via amendments to existing Parts or a new Part of ISO/IEC 15944.
6. Participating JTC1/SC32 P-0members are requested to advise the Part 12 Project Co-Editors via their4 CD ballot comments whether they would prefer the above aspects to be added as (a) an aspect not yet addressed; or (b) an exclusion.
In either case, whatever the decision taken re (a) or (b), this will impact Parts 5 and 8 of ISO/IEC 15944.
It is anticipated that some or all of these requirements will be addressed in future editions of ISO/IEC 15944-8 or in companion standards or technical reports (including possible new parts of ISO/IEC 15944).
1.4 IT-systems environment neutrality
This part of ISO/IEC 15944 does not assume nor endorse any specific system environment, database management system, database design paradigm, system development methodology, data definition language, command language, system interface, user interface, syntax, computing platform, or any technology required for implementation, i.e., it is information technology neutral. At the same time, this part of ISO/IEC 15944 maximizes an IT-enabled approach to its implementation and maximizes semantic interoperability.
© ISO 2014 – All rights reserved 29
150
922923
924925
926
927928929930
931932933
934935936937938939
940941942
943944945
946947948
949950
951
952953
954
955956957958959
![Page 30: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/30.jpg)
CD ISO/IEC 15944-12:2014(E)
2 Normative references
Project Co-Editors’ Notes:
1. The initial text below is that taken from Clause 2 in Part 8 (as well as Clause 2 in Part 5).
2. The entries below will be reviewed and amended based on use of these normative references in Part 12. Others will be added as required, (e.g., impact of Part 9 traceability requirements) and related standards. This work will be undertaken following the resolution of CD ballot comments.
3. Delete those entries which do not apply (probably at pre-DIS stage) and add Normative references as needed (any time).
4. In addition, several Parts of ISO/IEC 15944 are under review or (minor) revision which may be completed in 2014 or 2015 for their next edition. As such the dates in the Normative references will be updated accordingly. (This will also impact updates to relevant entries in Clause 3)
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
2.1 ISO/IEC, ISO and ITU27
ISO 639-2:1998 (E/F), Codes for the representation of names of languages — Part 2: Alpha-3 code/Codes pour la représentation des noms de langue — Partie 2: Code alpha-3
ISO 1087-1:2000 (E/F), Terminology work — Vocabulary — Part 1: Theory and application/Travaux terminologiques — Vocabulaire — Partie 1: Théorie et application
ISO/IEC 2382 (all parts) (E/F), Information technology — Vocabulary/Technologies de l'information — Vocabulaire
ISO 3166-1:2013 (E/F), Codes for the representation of names of countries and their subdivisions — Part 1: Country codes/Codes pour la représentation des noms de pays et de leur subdivisions — Partie 1: Codes pays
ISO 3166-2:2013 (E/F), Codes for the representation of names of countries and their subdivisions — Part 2: Country subdivision code/Codes pour la représentation des noms de pays et de leurs subdivisions — Partie 2: Code pour les subdivisions de pays
ISO 5127:2001(E), Information and documentation — Vocabulary
ISO/IEC 5218:2004(E/F), Information technology — Codes for the representation of human sexes/ Technologies de l’information — Codes de représentation des sexes humains
ISO/IEC 6523-1:1998(E/F), Information technology — Structure for the identification of organizations and organization parts — Part 1: Identification of organization identification schemes/Technologies de l'information — Structures pour l'identification des organisations et des parties d'organisations — Partie 1: Identification des systèmes d'identification d'organisations
ISO/IEC 6523-2:1998(E/F), Information technology — Structure for the identification of organizations and organization parts — Part 2: Registration of organization identification schemes/Technologies de l'information — Structures pour l'identification des organisations et des parties d'organisations — Partie 2: Enregistrement des systèmes d'identification d'organisations
27 For standards referenced for which both English and French versions are available both the English and French language titles are provided. This is independent of whether the English and French language versions of the standard are published as a single document or as separate documents. For those standards which are available in English only, only the English language title is provided.
30 © ISO 2014 – All rights reserved
152
960
961
962
963964965
966967
968969970
971972973
974
975976
977978
979980
981982983
984985986
987
988989
990991992993
994995996997
153154155156
![Page 31: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/31.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 7501-1:2008(E), Identification cards — Machine readable travel documents — Part 1: Machine readable passport
ISO/IEC 7501-2:1997(E), Identification cards — Machine readable travel documents — Part 2: Machine readable visa
ISO/IEC 7501-3:2005(E), Identification cards — Machine readable travel documents — Part 3: Machine readable official travel documents
ISO/IEC 7812-1:2006(E), Identification cards — Identification of issuers — Part 1: Numbering system
ISO/IEC 7812-2:2007(E), Identification cards — Identification of issuers — Part 2: Application and registration procedures
ISO 8601:2004(E), Data elements and interchange formats — Information interchange — Representation of dates and times
ISO/IEC 14662:2010(E/F), Information technology — Open-edi reference model/Technologies de l'information — Modèle de référence EDI-ouvert
ISO/IEC 15944-1:2011(E), Information technology — Business Operational View — Part 1: Operational aspects of Open-edi for implementation
ISO/IEC 15944-2:2014(E), Information technology — Business Operational View — Part 2: Registration of scenarios and their components as business objects
ISO/IEC 15944-4:2014(E), Information technology — Business Operational View — Part 4: Business transactions and scenarios — Accounting and economic ontology
ISO/IEC 15944-5:2014(E), Information technology — Business Operational View — Part 5: Identification and referencing of requirements of jurisdictional domains as sources external constraints
ISO/IEC 15944-7:2009(E), Information technology — Business Operational View — Part 7: eBusiness vocabulary
ISO/IEC 15944-8:2012 Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions
ISO/IEC CD3 15944-9 Information technology — Business Operational View — Part 9: Traceability framework
ISO/IEC 15944-10 Information technology — Business Operational View — Part 10: Coded domains
ISO 19108:2002(E), Geographic information — Temporal schema
ISO/IEC 19501:2005(E), Information technology— Open Distributed Processing — Unified Modeling Language (UML) Version 1.4.228
ISO 22857:2004(E), Health informatics — Guidelines on data protection to facilitate trans-border flows of personal health information
2.2 Referenced specifications29
APEC Privacy Framework. (2005)
28 Throughout this part of ISO/IEC 15944, ISO/IEC 19501:2005 is simply referenced as “UML”.
29 All references in this sub-clause were correct at the time of approval of this part of ISO/IEC 15944. The provisions of the referenced specifications, as identified in this sub-clause, are valid within the context of this part of ISO/IEC 15944. The reference to a specification within this part of ISO/IEC 15944 does not give it any further status within ISO/IEC; in particular, it does not give the referenced specification the status of an International Standard.
© ISO 2014 – All rights reserved 31
158
998999
10001001
10021003
1004
10051006
10071008
10091010
10111012
10131014
10151016
10171018
10191020
10211022
1023
1024
1025
10261027
10281029
1030
1031
159
160161162163
![Page 32: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/32.jpg)
CD ISO/IEC 15944-12:2014(E)
Charter of the United Nations (as signed 1945 and Amended 1965, 1968, and 1973+), United Nations (UN).
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995) Directive
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)
UN Convention on the Rights of Disabled Persons (2006+)
Vienna Convention of the Law of Treaties (1969), United Nations (UN)
3 Terms and definitions
Project Co-Editors’ Notes:
1. The initial set of terms and definitions presented is based on those in Clause 3 of Part 8. Not all may be relevant to Part 12 and therefore will be deleted at the pre-DIS stage.
2. Other terms and definitions are those based on document SC32/WG1 N0715 titled “Added key ILCM concepts, definitions and rules for the development of ISO/IEC 15944-12”. These were agreed to be added following the Santa Fe SC32/WG1 meeting.
3. In addition a definition for the concept of “information life cycle management (“ILCM”) has been developed. The following is the text that was also accepted at the Santa Fe meeting:
information life cycle management (ILCM)
series of actions and rules governing the management and its electronic data interchange (EDI) of set(s) of recorded information (SRIs) under the control of a Person from its creation to final disposition in compliance with applicable information law requirements.
NOTE: The inclusion of “information law” brings into this definition all the various information management activities.
4. We may need the concept/definition for “under the control of”
This is to cover those situations where the physical or electronic records of an organization (as a seller) are located at a site other than which it owns, or rents. Typical examples here include:
1. an organization subcontracting or outsourcing the storage of its physical or electronic SRIs to an “agent” who provides “off-site” storage facilities for dormant records.
2. An organization sub-contracting or outsourcing part or all of its data processing, telecommunications, etc. activities to an “agent” (e.g. as a VAN or cloud service ITC services provider)
In these and other cases the seller organization still maintains control of the SRIs themselves through is management rules, of the recorded information pertaining to a business transaction, including any personal information pertaining to a (prospective) buyer as an individual.. It is not clear at this time whether “under the control of” needs to be defined or whether this requirements s of this nature should be addressed through a series of rules to that effect, i.e., that the seller shall maintain and ensure control of any state changes and/or ILCM aspects for any personal information, created, collected or received, interchanged, etc with respect to a (prospective) buyer who is an individual.
5. In addition, several Parts of ISO/IEC 15944 are under review or (minor) revision which may be completed in 2014 or 2015 for their next edition. As such the information on their reference in Clause 3 will be updated as required.
32 © ISO 2014 – All rights reserved
165
1032
103310341035
1036
1037
1038
1039
1040
10411042
104310441045
10461047
1048
104910501051
10521053
1054
10551056
10571058
10591060
1061106210631064106510661067
106810691070
![Page 33: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/33.jpg)
CD ISO/IEC 15944-12:2014(E)
6. There are entries in Clause 3 which likely are not or will not be used when the development of the CD ballot document for Part 12 is completed. These will be deleted. A final check here will take place at the DIS stage.
For the purposes of this document, the following terms and definitions apply.
3.1addressset of data elements that specifies a location to which a recorded information item(s), a business object(s), a material object(s) and/or a person(s) can be sent or from which it can be received
NOTE 1 An address can be specified as either a physical address and/or electronic address.
NOTE 2 In the identification, referencing and retrieving of registered business objects, it is necessary to state whether the pertinent recorded information is available in both physical and virtual forms.
NOTE 3 In the context of Open-edi, a “recorded information item” is modelled and registered as an Open-edi scenario (OeS), Information Bundle (IB) or Semantic Component (SC).
[ISO/IEC 15944-2:2014, 3.1]
3.2agentPerson acting for another Person in a clearly specified capacity in the context of a business transaction
NOTE Excluded here are agents as "automatons" (or robots, bobots, etc.). In ISO/IEC 14662:2009, "automatons" are recognized and provided for but as part of the Functional Service View (FSV) where they are defined as an "Information Processing Domain (IPD)".
[ISO/IEC 15944-1:2011, 3.1]
3.3anonymizationprocess whereby the association between a set of recorded information (SRI) and an identifiable individual is removed where such an association may have existed
NOTE Adapted from ISO 25237.
[ISO/IEC 15944-8:2012, 3.3]
3.4attributecharacteristic of an object or entity
[ISO/IEC 11179-3:2003, 3.1.3]
3.5audit trailchronological record of IT system activities that is sufficient to enable the reconstruction, reviewing and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event pertaining to sets of recorded information (SRIs) in a business transaction through all its processes, i.e., from planning to the end of post-actualization
3.6authenticationprovision of assurance of the claimed identity of an entity
[ISO/IEC 10181-2:1996, 3.3]
© ISO 2014 – All rights reserved 33
167
107110721073
1074
1075107610771078
1079
10801081
10821083
1084
108510861087
108810891090
1091
1092109310941095
1096
1097
109810991100
1101
1102110311041105110611071108
110911101111
1112
![Page 34: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/34.jpg)
CD ISO/IEC 15944-12:2014(E)
3.7authenticityproperty that ensures that the identity of a subject or resource is the one claimed. Authenticity applies to entities such as users, processes, systems and information
NOTE Authenticity applies to entities such as users, processes, systems and information.
[ISO/IEC TR 13335-1:1996, 3.3]
3.8back-up copycopy that is any of the following: a) additional resource or duplicate copy of data on different a storage medium stored off-line for emergency purposes; b) disk, tape or other machine-readable copy of a data or program file; c) data or program file recorded and stored off-line for emergency or archival purposes; d) record that preserves the evidence and information it contains if the original is not available
3.9businessseries of processes, each having a clearly understood purpose, involving more than one Person, realized through the exchange of recorded information and directed towards some mutually agreed upon goal, extending over a period of time
[ISO/IEC 14662:2010, 3.2]
3.10business eventoccurrence in time that partners to a business transaction wish to monitor or control
NOTE 1 Business events are the workflow tasks that business partners need to accomplish to complete a business transaction among themselves. As business events occur, they cause a business transaction to move through its various phases of planning, identification, negotiation, actualization, and post-actualization.
NOTE 2 Occurrences in time can either be: (a) internal as mutually agreed to among the parties to a business transaction; and/or, (b) reference some common publicly available and recognized date/time referencing schema, (e.g., one based on using the ISO 8601 and/or ISO 19135 standards).
[ISO/IEC 15944-4:2014, 3.5]
3.11business objectunambiguously identified, specified, referenceable, registered and re-useable Open-edi scenario, or scenario component of a business transaction
NOTE As an “object”, a “business object” exists only in the context of a business transaction.
[ISO/IEC 15944-2:2014, 3.6]
3.12Business Operational View (BOV)perspective of business transactions limited to those aspects regarding the making of business decisions and commitments among Persons, which are needed for the description of a business transaction
[ISO/IEC 14662:2010, 3.3]
3.13business transactionpredefined set of activities and/or processes of Persons which is initiated by a Person to accomplish an explicitly shared business goal and terminated upon recognition of one of the agreed conclusions by all the involved Persons although some of the recognition may be implicit
34 © ISO 2014 – All rights reserved
169
1113111411151116
1117
1118
1119112011211122112311241125
11261127112811291130
1131
113211331134
113511361137
113811391140
1141
1142114311441145
1146
1147
1148114911501151
1152
11531154115511561157
![Page 35: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/35.jpg)
CD ISO/IEC 15944-12:2014(E)
[ISO/IEC 14662:2010, 3.4]
3.14business transaction identifier (BTI)identifier assigned by a seller or a regulator to an instantiated business transaction among the Persons involved
NOTE 1 The identifier assigned by the seller or regulator shall have the properties and behaviours of an “identifier (in a business transaction)”.
NOTE 2 As an identifier (in a business transaction), a BTI serves as the unique common identifier for all Persons involved for the identification, referencing, retrieval of recorded information, etc., pertaining to the commitments made and the resulting actualization (and post-actualization) of the business transaction agreed to.
NOTE 3 A business transaction identifier can be assigned at any time during the planning, identification or negotiation phases but shall be assigned at least prior to the start or during the actualization phase.
NOTE 4 As and where required by the applicable jurisdictional domain(s), the recorded information associated with the business transaction identifier (BTI) may well require the seller to include other identifiers, (e.g., from a value-added good or service tax, etc., perspective) as assigned by the applicable jurisdictional domain(s).
[ISO/IEC 15944-5: 2014, 3.12]
3.15buyerPerson who aims to get possession of a good, service and/or right through providing an acceptable equivalent value, usually in money, to the Person providing such a good, service and/or right
[ISO/IEC 15944-1:2011, 3.8]
3.16characteristicabstraction of a property of an object or of a set of objects
NOTE Characteristics are used for describing concepts.
[ISO 1087-1:2000, 3.2.4]
3.17character setfinite set of different characters that is complete for a given purpose
EXAMPLE The international reference version of the character set of ISO 10646.
[ISO/IEC 2382-4:1999, 04.01.02]
3.18classification systemsystematic identification and arrangement of business activities and/or scenario components into categories according to logically structured conventions, methods and procedural rules as specified in a classification schema
NOTE 1 The classification code or number often serves as a semantic identifier (SI) for which one or more human interface equivalents (HIEs) exist.
NOTE 2 The rules of a classification schema governing the operation of a classification system at times lead to the use of ID codes which have an intelligence built into them, (e.g., in the structure of the ID, the manner in which it can be parsed, etc.). Here the use of block-numeric numbering schemas is an often used convention.
NOTE 3 Adapted from ISO 15489-1:2001, 3.5.
© ISO 2014 – All rights reserved 35
171
1158
1159116011611162
11631164
116511661167
11681169
117011711172
1173
1174117511761177
1178
117911801181
1182
1183
118411851186
1187
1188
11891190119111921193
11941195
119611971198
1199
![Page 36: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/36.jpg)
CD ISO/IEC 15944-12:2014(E)
[ISO/IEC 15944-5:2014, 3.17]
3.19codeset of data representation in different forms according to a pre-established set of rules
NOTE In this standard the "pre-established set of rules" is determined and enacted by a Source Authority and must be explicitly stated.
[ISO 639-2:2013, 3.1]
3.20code (in coded domain)identifier, i.e., an ID code, assigned to an entity as member of a coded domain according to the pre-established set of rules governing that coded domain
[ISO/IEC 15944-5:2008, 3.19]
3.21coded domaindomain for which (1) the boundaries are defined and explicitly stated as a rulebase of a coded domain Source Authority; and (2) each entity which qualifies as a member of that domain is identified through the assignment of a unique ID code in accordance with the applicable Registration Schema of that Source Authority
NOTE 1 The rules governing the assignment of an ID code to members of a coded domain reside with its Source Authority and form part of the Coded Domain Registration Schema of the Source Authority.
NOTE 2 Source Authorities which are jurisdictional domains are the primary source of coded domains.
NOTE 3 A coded domain is a data set for which the contents of the data element values are predetermined and defined according to the rulebase of its Source Authority and as such have predefined semantics.
NOTE 4 Associated with a code in a coded domain can be: (a) one and/or more equivalent codes; (b) one and/or more equivalent representations especially those in the form of Human Interface Equivalent (HIE) (linguistic) expressions.
NOTE 5 In a coded domain the rules for assignment and structuring of the ID codes must be specified.
NOTE 6 Where an entity as member of a coded domain is allowed to have, i.e., assigned, more than one ID code, i.e., as equivalent ID codes (possibly including names), one of these must be specified as the pivot ID code.
NOTE 7 A coded domain in turn can consist of two or more coded domains, i.e., through the application of the inheritance principle of object classes.
NOTE 8 A coded domain may contain ID code which pertains to predefined conditions other than qualification of membership of entities in the coded domain. Further, the rules governing a coded domain may or may not provide for user extensions.
EXAMPLE (1) The use of ID Code "0" (or "00", etc.) for “Others, (2) the use of ID Code "9" (or "99", etc.) for “Not Applicable”; (3) the use of “8” (or “98”) for “Not Known”; and/or, if required, (4) the pre-reservation of a series of ID codes for use of “user extensions”.
NOTE 9 In object methodology, entities which are members of a coded domain are referred to as instances of a class.
EXAMPLE In UML modelling notation, an ID code is viewed as an instance of an object class.
[ISO/IEC 15944-2:2014, 3.13]
36 © ISO 2014 – All rights reserved
173
1200
120112021203
12041205
1206
1207120812091210
1211
121212131214121512161217
12181219
1220
12211222
12231224
1225
12261227
12281229
123012311232
123312341235
1236
1237
1238
![Page 37: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/37.jpg)
CD ISO/IEC 15944-12:2014(E)
3.22coded Domain Registration Schema (cdRS)formal definition of both (1) the data fields contained in the identification and specification of an entity forming part of the members a coded domain including the allowable contents of those fields; and, (2) the rules for the assignment of identifiers
[ISO/IEC 15944-5:2014, 3.21]
3.23coded domain Source Authority (cdSA)Person, usually an organization, as a Source Authority which sets the rules governing a coded domain
NOTE 1 Source Authority is a role of a Person and for widely used coded domains the coded domain Source Authority is often a jurisdictional domain.
NOTE 2 Specific sectors, (e.g., banking, transport, geomatics, agriculture, etc.), may have particular coded domain Source Authority (ies) whose coded domains are used in many other sectors.
NOTE 3 A coded domain Source Authority usually also functions as a Registration Authority but can use an agent, i.e., another Person, to execute the registration function on its behalf.
[ISO/IEC 15944-2:2014, 3.14]
3.24collaboration spacebusiness activity space where an economic exchange of valued resources is viewed independently and not from the perspective of any business partner
NOTE In collaboration space, an individual partner’s view of economic phenomena is de-emphasized. Thus, the common use business and accounting terms like purchase, sale, cash receipt, cash disbursement, raw materials, and finished goods is not allowed because they view resource flows from a participant’s perspective.
[ISO/IEC 15944-4:2014, 3.12]
3.25commitmentmaking or accepting of a right, obligation, liability or responsibility by a Person that is capable of enforcement in the jurisdictional domain in which the commitment is made
[ISO/IEC 14662:2010, 3.5]
3.26composite identifieridentifier (in a business transaction) functioning as a single unique identifier consisting of one or more other identifiers, and/or one or more other data elements, whose interworkings are rule-based
NOTE 1 Identifiers (in business transactions) are for the most part composite identifiers.
NOTE 2 The rules governing the structure and working of a composite identifier should be specified.
NOTE 3 Most widely used composite identifiers consist of the combinations of: (a) the ID of the overall identification/numbering schema, (e.g., ISO/IEC 6532, ISO/IEC 7812, ISO/IEC 7506, UPC/EAN, ITU-T E.164, etc.), which is often assumed; (b) the ID of the issuing organization (often based on a block numeric numbering schema); and, (c) the ID of the entities forming part of members of the coded domain of each issuing organization.
[ISO/IEC 15944-2:2014, 3.16]
© ISO 2014 – All rights reserved 37
175
12391240124112421243
1244
124512461247
12481249
12501251
12521253
1254
1255125612571258
125912601261
1262
1263126412651266
1267
1268126912701271
1272
1273
1274127512761277
1278
![Page 38: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/38.jpg)
CD ISO/IEC 15944-12:2014(E)
3.27computational integrityexpression of a standard in a form that ensures precise description of behaviour and semantics in a manner that allows for automated processing to occur, and the managed evolution of such standards in a way that enables dynamic introduction by the next generation of information systems
NOTE Open-edi standards have been designed to be able to support computational integrity requirements especially from a registration and re-use of business objects perspectives.
[ISO/IEC 15944-2:2014, 3.18]
3.28constraintrule, explicitly stated, that prescribes, limits, governs or specifies any aspect of a business transaction
NOTE 1 Constraints are specified as rules forming part of components of Open-edi scenarios, i.e., as scenario attributes, roles, and/or information bundles.
NOTE 2 For constraints to be registered for implementation in Open-edi, they must have unique and unambiguous identifiers.
NOTE 3 A constraint may be agreed to among parties, (condition of contract) and is therefore considered an "internal constraint". Or a constraint may be imposed on parties, (e.g., laws, regulations, etc.), and is therefore considered an "external constraint".
[ISO/IEC 15944-1:2011, 3.11]
3.29consumerbuyer who is an individual to whom consumer protection requirements are applied as a set of external constraints on a business transaction
NOTE 1 Consumer protection is a set of explicitly defined rights and obligations applicable as external constraints on a business transaction.
NOTE 2 The assumption is that a consumer protection applies only where a buyer in a business transaction is an individual. If this is not the case in a particular jurisdiction, such external constraints should be specified as part of scenario components as applicable.
NOTE 3 It is recognized that external constraints on a buyer of the nature of consumer protection may be peculiar to a specified jurisdiction.
[ISO/IEC 15944-1:2011, 3.12]
3.30consumer protectionset of external constraints of a jurisdictional domain as rights of a consumer and thus as obligations (and possible liabilities) of a vendor in a business transaction which apply to the good, service and/or right forming the object of the business transaction (including associated information management and interchange requirements including applicable (sets of) recorded information
NOTE 1 Jurisdictional domains may restrict the application of their consumer protection requirements as applicable only to individuals engaged in a business transaction of a commercial activity undertaken for personal, family or household purposes, i.e., they do not apply to natural persons in their role as "organization" or "organization Person".
NOTE 2 Jurisdictional domains may have particular consumer protection requirements which apply specifically to individuals who are considered to be a "child" or a “minor”, (e.g., those individuals who have not reached their thirteenth (13) birthday).
NOTE 3 Some jurisdictional domains may have consumer protection requirements which are particular to the nature of the good, service and/or right being part of the goal of a business transaction.
38 © ISO 2014 – All rights reserved
177
12791280128112821283
12841285
1286
128712881289
12901291
12921293
129412951296
1297
1298129913001301
13021303
130413051306
13071308
1309
131013111312131313141315
131613171318
131913201321
13221323
![Page 39: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/39.jpg)
CD ISO/IEC 15944-12:2014(E)
[ISO/IEC 15944-5:2014, 3.33]
3.31controlled vocabulary (CV)vocabulary whose entries, i.e., definition/term pairs, are controlled by a Source Authority based on a rulebase and process for addition/deletion of entries
NOTE 1 In a controlled vocabulary, there is a one-to-one relationship of definition and term.
EXAMPLE The contents "Clause 3 Definitions" in ISO/IEC standards are examples of controlled vocabularies with the entities being identified and referenced through their ID codes, i.e., via their clause numbers.
NOTE 2 In a multilingual controlled vocabulary, the definition/term pairs in the languages used are deemed to be equivalent, i.e., with respect to their semantics.
NOTE 3 The rulebase governing a controlled vocabulary may include a predefined concept system.
[ISO/IEC 15944-5:2014, 3.34]
3.32data (in a business transaction)representations of recorded information that are being prepared or have been prepared in a form suitable for use in a computer system
[ISO/IEC 15944-1:2011, 3.14]
3.33data conversionprocess(es) of changing data, i.e., set(s) of recorded information (SRI(s)) from one format or representation to another which maintains the authenticity, integrity, reliability and usability of the SRI(s) as well as relevant ILCM requirements, and especially those of an external constraints nature including privacy protection requirements where the data involves personal information
NOTE: A characteristics of data conversion is a change in the technology used for managing and/or representing the contents of the SRI.”
EXAMPLE: Examples include data conversion resulting from a change in text processing software (e.g. MsWord to HTML), from one database software to another, from a non-data based software to a database based software approach or vice-versa, etc
NOTE Adapted from CAN/CGSB-72.34-2005, 3.16
3.34data elementunit of data for which the definition, identification, representation and permissible values are specified by means of a set of attributes
[ISO/IEC 11179-1:2004, 3.3.8]
3.35data element (in organization of data)unit of data that is considered in context to be indivisible
EXAMPLE The data element "age of a person" with values consisting of all combinations of 3 decimal digits.
NOTE Differs from the entry 17.06.02 in ISO/IEC 2382-17.
[ISO/IEC 2382-04:1998, 04.07.01]
© ISO 2014 – All rights reserved 39
179
1324
1325132613271328
1329
13301331
13321333
1334
1335
1336133713381339
1340
134113421343134413451346
13471348
134913501351
13521353
1354135513561357
1358
135913601361
1362
1363
1364
![Page 40: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/40.jpg)
CD ISO/IEC 15944-12:2014(E)
3.36data migrationmoving sets of recorded information from one IT System or device to another, as required by changes in an IT System configuration or as requested by the user, while assuring that the data will remain addressable and that data integrity will be maintained in the new environment
3.37datasetidentifiable collection of data
NOTE A dataset may be a smaller grouping of data which, though limited by some constraint such as spatial extent or feature type, is located physically within a larger dataset. Theoretically, a dataset may be as small as a single feature or feature attribute contained within a larger dataset. A hardcopy map or chart may be considered a dataset.
[ISO 19115:2003, 4.2]
3.38dataset seriescollection of datasets sharing the same product specification
[ISO 19115:2003, 4.3]
3.39data synchronization (in business transaction)process of continuous harmonization of a set(s) of recorded information among all the parties to a business transaction to ensure that the current state of the content value(s) of such a set(s) of recorded information is the same in the IT systems of all the participating parties
NOTE Adapted from GS1 Global Traceability Standard (GDSN) Glossary.
3.40Decision Making Application (DMA)model of that part of an Open-edi system that makes decisions corresponding to the role(s) that the Open-edi Party plays as well as the originating, receiving and managing data values contained in the instantiated Information Bundles which is not required to be visible to the other Open-edi Parties (OeP)
[ISO/IEC 14662:2010, 3.7]
3.41de facto languagenatural language used in a jurisdictional domain which has the properties and behaviours of an official language in that jurisdictional domain without having formally been declared as such by that jurisdictional domain
NOTE 1 A de facto language of a jurisdictional domain is often established through long term use and custom.
NOTE 2 Unless explicitly stated otherwise and for the purposes of modelling a business transaction through scenario(s), scenario attributes and/or scenario components, a de facto language of a jurisdictional domain is assumed to have the same properties and behaviours of an official language.
[ISO/IEC 15944-5:2014, 3.42]
3.42definitionrepresentation of a concept by a descriptive statement which serves to differentiate it from related concepts
[ISO/IEC 1087-1:2000, 3.3.1]
40 © ISO 2014 – All rights reserved
181
13651366136713681369
137013711372
137313741375
1376
137713781379
1380
13811382138313841385
1386
13871388138913901391
1392
13931394139513961397
1398
139914001401
1402
140314041405
1406
![Page 41: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/41.jpg)
CD ISO/IEC 15944-12:2014(E)
3.43designationrepresentation of a concept by a sign which denotes it
NOTE 1 In terminology work three types of designations are distinguished: symbols, appellations and terms.
NOTE 2 Adapted from ISO 1087-1:2000, 3.4.1.
[ISO/IEC 15944-2:20014, 3.79]
3.44distinguishing identifierdata that unambiguously distinguishes an entity in the authentication process
[ISO/IEC 10181-2:1996, 3.11]
3.45eBusinessbusiness transaction, involving the making of commitments, in a defined collaboration space, among Persons using their IT Systems, according to Open-edi standards
NOTE 1 eBusiness can be conducted on both a for-profit and not-for-profit basis.
NOTE 2 A key distinguishing aspect of eBusiness is that it involves the making of commitment(s) of any kind among the Persons in support of a mutually agreed upon goal, involving their IT Systems, and doing so through the use of EDI (using a variety of communication networks including the Internet).
NOTE 3 eBusiness includes various application areas such as e-commerce, e-administration, e-logistics, e-government, e-medicine, e-learning, etc.
NOTE 4 The equivalent French language term for “eBusiness” is always presented in its plural form.
[ISO/IEC 15944-7:2009, 3.06]
3.46electronic addressaddress used in a recognized electronic addressing scheme, (e.g., telephone, telex, IP, etc.), to which recorded information item(s) and/or business object(s) can be sent to or received from a Contact
[ISO/IEC 15944-2:2014, 3.32]
3.47Electronic Data Interchange (EDI)automated exchange of any predefined and structured data for business purposes among information systems of two or more Persons
NOTE This definition includes all categories of electronic business transactions.
[ISO/IEC 14662:2010, 3.8]
3.48electronic signaturesignature that consists of one or more letters, characters, numbers or other symbols in digital form incorporated in, attached to or associated with a particular digital/electronic set of recorded information (SRI)
NOTE Adapted from PIPEDA, Part 2, section 31(1); CAN/CGSB-72.34-2005, 3.28.
© ISO 2014 – All rights reserved 41
183
140714081409
1410
1411
1412
141314141415
1416
1417141814191420
1421
142214231424
14251426
1427
1428
1429143014311432
1433
1434143514361437
1438
1439
1440144114421443144414451446
![Page 42: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/42.jpg)
CD ISO/IEC 15944-12:2014(E)
3.49entityany concrete or abstract thing that exists, did exist, or might exist, including associations among these things
EXAMPLE A person, object, event, idea, process, etc.
NOTE An entity exists whether data about it are available or not.
[ISO/IEC 2382-17:1999, 17.02.05]
3.50entity authenticationcorroboration that the entity is the one claimed
[ISO/IEC 9798-1:1997, 3.3.11]
3.51exchange code setset of ID codes identified in a coded domain as being suitable for information exchange as shareable data
EXAMPLE The 3-numeric, 2-alpha and 3-alpha code sets in ISO 3166-1.
[ISO/IEC 15944-5:2014, 3.49]
3.52external constraintconstraint which takes precedence over internal constraints in a business transaction, i.e., is external to those agreed upon by the parties to a business transaction
NOTE 1 Normally external constraints are created by law, regulation, orders, treaties, conventions or similar instruments.
NOTE 2 Other sources of external constraints are those of a sectoral nature, those which pertain to a particular jurisdiction or a mutually agreed to common business conventions, (e.g., INCOTERMS, exchanges, etc.).
NOTE 3 External constraints can apply to the nature of the good, service and/or right provided in a business transaction.
NOTE 4 External constraints can demand that a party to a business transaction meet specific requirements of a particular role.
EXAMPLE 1 Only a qualified medical doctor may issue a prescription for a controlled drug.
EXAMPLE 2 Only an accredited share dealer may place transactions on the New York Stock Exchange.
EXAMPLE 3 Hazardous wastes may only be conveyed by a licensed enterprise.
NOTE 5 Where the Information Bundles (IBs), including their Semantic Components (SCs) of a business transaction are also to form the whole of a business transaction, (e.g., for legal or audit purposes), all constraints must be recorded.
EXAMPLE There may be a legal or audit requirement to maintain the complete set of recorded information pertaining to a business transaction, i.e., as the information bundles exchanged, as a "record".
NOTE 6 A minimum external constraint applicable to a business transaction often requires one to differentiate whether the Person, i.e., that is a party to a business transaction, is an "individual", "organization", or "public administration". For example, privacy rights apply only to a Person as an "individual".
[ISO/IEC 15944-1:2011, 3.23]
42 © ISO 2014 – All rights reserved
185
144714481449
1450
1451
1452
145314541455
1456
145714581459
1460
1461
1462146314641465
14661467
14681469
14701471
14721473
1474
1475
1476
14771478
14791480
148114821483
1484
![Page 43: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/43.jpg)
CD ISO/IEC 15944-12:2014(E)
3.53Formal Description Technique (FDT)specification method based on a description language using rigorous and unambiguous rules both with respect to developing expressions in the language (formal syntax) and interpreting the meaning of these expressions (formal semantics)
[ISO/IEC 14662:2010, 3.9]
3.54 Functional Service View (FSV)perspective of business transactions limited to those information technology interoperability aspects of IT Systems needed to support the execution of Open-edi transactions
[ISO/IEC 14662:2010, 3.10]
3.55Human Interface Equivalent (HIE)representation of the unambiguous and IT-enabled semantics of an IT interface equivalent (in a business transaction), often the ID code of a coded domain (or a composite identifier), in a formalized manner suitable for communication to and understanding by humans
NOTE 1 Human interface equivalents can be linguistic or non-linguistic in nature but their semantics remain the same although their representations may vary.
NOTE 2 In most cases there will be multiple human interface equivalent representations as required to meet localization requirements, i.e., those of a linguistic nature, jurisdictional nature, and/or sectoral nature.
NOTE 3 Human interface equivalents include representations in various forms or formats, (e.g., in addition to written text those of an audio, symbol (and icon) nature, glyphs, image, etc.).
[ISO/IEC 15944-2:2014, 3.35]
3.56IB Identifierunique, linguistically neutral, unambiguous referenceable identifier for an Information Bundle
[ISO/IEC 15944-2:2014, 3.36]
3.57ID codeidentifier assigned by the coded domain Source Authority (cdSA) to a member of a coded domain ID
NOTE 1 ID codes must be unique within the Registration Schema of that coded domain.
NOTE 2 Associated with an ID code in a coded domain can be: (a) one or more equivalent codes; (b) one or more equivalent representations, especially those in the form of human equivalent (linguistic) expressions.
NOTE 3 Where an entity as a member of a coded domain is allowed to have more than one ID code, i.e., as equivalent codes (possibly including names), one of these must be specified as the pivot ID code.
NOTE 4 A coded domain may contain ID codes pertaining to entities which are not members as peer entities, i.e., have the same properties and behaviours, such as ID codes which pertain to predefined conditions other than member entities. If this is the case, the rules governing such exceptions must be predefined and explicitly stated.
EXAMPLE (1) The use of an ID code "0" (or "00", etc.), for “Other”; (2) the use of an ID code "9" (or "99") for “Not Applicable”; (3) the use of “8” (or “98”) for “Not Known”; if required, (4) the pre-reservation of a series or set of ID codes for use for "user extensions".
NOTE 5 In UML modeling notation, an ID codes is viewed as an instance of an object class.
[ISO/IEC 15944-2:2014, 3.37]
© ISO 2014 – All rights reserved 43
187
14851486148714881489
1490
1491149214931494
1495
14961497149814991500
15011502
15031504
15051506
1507
150815091510
1511
151215131514
1515
15161517
15181519
152015211522
152315241525
1526
1527
![Page 44: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/44.jpg)
CD ISO/IEC 15944-12:2014(E)
3.58identificationrule-based process, explicitly stated, involving the use of one or more attributes, i.e., data elements, whose value (or combination of values) are used to identify uniquely the occurrence or existence of a specified entity
[ISO/IEC 15944-1:2011, 3.26]
3.59identifier (in business transaction)unambiguous, unique and a linguistically neutral value, resulting from the application of a rule-based identification process
NOTE 1 Identifiers must be unique within the identification scheme of the issuing authority.
NOTE 2 An identifier is a linguistically independent sequence of characters capable of uniquely and permanently identifying that with which it is associated. (See ISO 19135:2005 (4.1.5)
[ISO/IEC 15944-1:2011, 3.27]
3.60individualPerson who is a human being, i.e., a natural person, who acts as a distinct indivisible entity or is considered as such
[ISO/IEC 15944-1:2011, 3.28]
3.61individual accessibilityset of external constraints of a jurisdictional domain as rights of an individual with disabilities to be able to use IT Systems at the human, i.e., user, interface and the concomitant obligation of a seller to provide such adaptive technologies
NOTE Although “accessibility” typically addresses users who have a disability, the concept is not limited to disability issues.
EXAMPLE Disabilities in the form of functional and cognitive limitations include: (a) people who are blind;(b) people with low vision; (c) people with colour blindness; (d) people who are hard of hearing or deaf, i.e., are hearing impaired; (e) people with physical disabilities; and, (f) people with language or cognitive disabilities.
[ISO/IEC 15944-5:2014, 3.60]
3.62individual anonymitystate of not knowing the identity or not having any recording of personal information on or about an individual as a buyer by the seller or regulator, (or any other party) to a business transaction
3.63individual authenticationprovision of the assurance of a recognized individual identity (rii) sufficient for the purpose of the business transaction
3.64individual identity (ii)Person identity of an individual, i.e., an individual identity, consisting of the combination of the persona information and identifier used by an individual in a business transaction, i.e., the making of any kind of commitment
[ISO/IEC 15944-8:2012, 3.69]
44 © ISO 2014 – All rights reserved
189
1528152915301531
1532
1533153415351536
1537
15381539
1540
1541154215431544
1545
15461547154815491550
15511552
155315541555
1556
1557155815591560
1561156215631564
15651566156715681569
1570
![Page 45: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/45.jpg)
CD ISO/IEC 15944-12:2014(E)
3.65individual persona Registration Schema (ipRS)persona Registration Schema (pRS) where the persona is, or includes, that of an individual being registered
NOTE 1 Where a persona Registration Schema includes persona of sub-types of Persons, i.e., individuals, organizations, and/or, public administrations, those which pertain to individuals shall be identified as such because public policy as external constraints apply including those of a privacy protection requirements nature.
NOTE 2 In an individual persona Registration Schema, one shall state whether or not a truncated name, i.e. registered persona, of the individual, is allowed or mandatory, and if so, the ipRS shall explicitly state the rules governing the formation of the same.
[ISO/IEC 15944-8:2012, 3.60]
3.66Information Bundle (IB)formal description of the semantics of the recorded information to be exchanged by Open-edi Parties playing roles in an Open-edi scenario
[ISO/IEC 14662:2010, 3.11]
3.67information lawany law, regulation, policy, or code (or any part thereof) that requires the creation, receipt, collection, description or listing, production, retrieval, submission, retention, storage, preservation or destruction of recorded information, and/or that places conditions on the access and use, confidentiality, privacy, integrity, accountabilities, continuity and availability of the processing, reproduction, distribution, transmission, sale, sharing or other handling of recorded information
[ISO/IEC 15944-8:2012, 3.62]
3.68Information Processing Domain (IPD)Information Technology System which includes at least either a Decision Making Application (DMA) and/or one of the components of an Open-edi Support Infrastructure, and acts/executes on behalf of an Open-edi Party (either directly or under a delegated authority)
[ISO/IEC 14662:2010, 3.12]
3.69Information Technology System (IT System)set of one or more computers, associated software, peripherals, terminals, human operations, physical processes, information transfer means, that form an autonomous whole, capable of performing information processing and/or information transfer
[ISO/IEC 14662:2010, 3.13]
3.70internal constraintconstraint which forms part of the commitment(s) mutually agreed to among the parties to a business transaction
NOTE Internal constraints are self-imposed. They provide a simplified view for modelling and re-use of scenario components of a business transaction for which there are no external constraints or restrictions to the nature of the conduct of a business transaction other than those mutually agreed to by the buyer and seller.
[ISO/IEC 15944-1:2011, 3.33]
© ISO 2014 – All rights reserved 45
191
1571157215731574
157515761577
157815791580
1581
1582158315841585
1586
1587158815891590159115921593
1594
15951596159715981599
1600
16011602160316041605
1606
1607160816091610
161116121613
1614
![Page 46: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/46.jpg)
CD ISO/IEC 15944-12:2014(E)
3.71IT-enablementtransformation of a current standard used in business transactions, (e.g., coded domains), from a manual to computational perspective so as to be able to support commitment exchange and computational integrity
[ISO/IEC 15944-5:2014, 3.65]
3.72IT-interface equivalentcomputer processable identification of the unambiguous semantics of a scenario, scenario attribute and/or scenario component(s) pertaining to a commitment exchange in a business transaction which supports computational integrity
NOTE 1 IT interface equivalents have the properties of identifiers (in business transaction) and are used to support semantic interoperability in commitment exchange.
NOTE 2 The value of an IT interface equivalent at times is a composite identifier.
NOTE 3 An IT interface equivalent as a composite identifier can consist of the identifier of a coded domain plus an ID code of that coded domain.
NOTE 4 An IT interface equivalent is at times used as a semantic identifier.
NOTE 5 An IT interface equivalent may have associated with it one or more human interface equivalents (HIEs).
NOTE 6 The value of an IT Interface is independent of its encoding in programming languages or APIs.
[ISO/IEC 15944-2:2014, 3.45]
3.73jurisdictional domainjurisdiction, recognized in law as a distinct legal and/or regulatory framework, which is a source of external constraints on Persons, their behaviour and the making of commitments among Persons including any aspect of a business transaction
NOTE 1 The pivotal jurisdictional domain is a United Nations (UN) recognized member state. From a legal and sovereignty perspective they are considered "peer" entities. Each UN member state, (a.k.a. country) may have sub-administrative divisions as recognized jurisdictional domains, (e.g., provinces, territories, cantons, länder, etc.), as decided by that UN member state.
NOTE 2 Jurisdictional domains can combine to form new jurisdictional domains, (e.g., through bilateral, multilateral and/or international treaties).
EXAMPLE Included here, for example, are the European Union (EU), NAFTA, WTO, WCO, ICAO, WHO, Red Cross, the ISO, the IEC, the ITU, etc.
NOTE 3 Several levels and categories of jurisdictional domains may exist within a jurisdictional domain.
NOTE 4 A jurisdictional domain may impact aspects of the commitment(s) made as part of a business transaction including those pertaining to the making, selling, and transfer of goods, services and/or rights (and resulting liabilities) and associated information. This is independent of whether such interchange of commitments is conducted on a for-profit or not-for-profit basis and/or includes monetary values.
NOTE 5 Laws, regulations, directives, etc., issued by a jurisdictional domain are considered as parts of that jurisdictional domain and are the primary sources of external constraints on business transactions.
[ISO/IEC 15944-5:2014, 3.67]
46 © ISO 2014 – All rights reserved
193
16151616161716181619
1620
16211622162316241625
16261627
1628
16291630
1631
1632
1633
1634
16351636163716381639
1640164116421643
16441645
16461647
1648
1649165016511652
16531654
1655
![Page 47: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/47.jpg)
CD ISO/IEC 15944-12:2014(E)
3.74jurisdictional domain identifierID code of a jurisdictional domain as recognized for use by peer jurisdictional domains within a system of mutual recognition
[ISO/IEC 15944-2:2014, 3.47]
3.75languagesystem of signs for communication, usually consisting of a vocabulary and rules
NOTE In this standard, language refers to natural languages or special languages, but not "programming languages" or "artificial languages".
[ISO 5127-1:2001, 1.1.2.01]
3.76language codecombination of characters used to represent a language or languages
NOTE 1 In this standard, the ISO 639-2/T (Terminology) three-alpha code set, shall be used.
NOTE 2 Adapted from ISO 639-2:1998, 3.2.
[ISO/IEC 15944-5:2014, 3.70]
3.77legally recognized language (LRL)natural language which has status (other than an official language or de facto language) in a jurisdictional domain as stated in an act, regulation, or other legal instrument, which grants a community of people (or its individuals) the right to use that natural language in the context stipulated by the legal instrument(s)
NOTE The LRL can be specified through either: (a) the identification of a language by the name used; or, (b) the identification of a people and thus their language(s).
EXAMPLE In addition to acts and regulations, legal instruments include self-government agreements, land claim settlements, court decisions, jurisprudence, etc.
[ISO/IEC 15944-5:2014, 3.71]
3.78legally recognized name (LRN)persona associated with a role of a Person recognized as having legal status and so recognized in a jurisdictional domain as accepted or assigned in compliance with the rules applicable of that jurisdictional domain, i.e. as governing the coded domain of which the LRN is a member
NOTE 1 A LRN may be of a general nature and thus be available for general use in commitment exchange or may arise from the application of a particular law, regulation, program or service of a jurisdictional domain and thus will have a specified use in commitment exchange.
NOTE 2 The process of the establishment of a LRN is usually accompanied by the assignment of a unique identifier.
NOTE 3 A LRN is usually a registry entry in a register established by the jurisdictional domain (usually by a specified public administration within that jurisdictional domain) for the purpose of applying the applicable rules and registering and recording LRNs (and possible accompanying unique identifiers accordingly).
NOTE 4 A Person may have more than one LRN (and associated LRN identifier).
[ISO/IEC 15944-5:2014, 3.72]
© ISO 2014 – All rights reserved 47
195
1656165716581659
1660
166116621663
16641665
1666
166716681669
1670
1671
1672
167316741675167616771678
16791680
16811682
1683
16841685168616871688
168916901691
1692
169316941695
1696
1697
![Page 48: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/48.jpg)
CD ISO/IEC 15944-12:2014(E)
3.79listordered set of data elements
[ISO/IEC 2382-4:1999, 04.08.01]
3.80localizationpertaining to or concerned with anything that is not global and is bound through specified sets of constraints of: (a) a linguistic nature including natural and special languages and associated multilingual requirements; (b) jurisdictional nature, i.e., legal, regulatory, geopolitical, etc.; (c) a sectoral nature, i.e., industry sector, scientific, professional, etc.; (d) a human rights nature, i.e., privacy, disabled/handicapped persons, etc.; (e) consumer behaviour requirements; and/or, (f) safety or health requirements
NOTE Within and among "locales", interoperability and harmonization objectives also apply.
[ISO/IEC 15944-5:2014, 3.75]
3.81locationplace, either physical or electronic, that can be defined as an address
[ISO/IEC 15944-2:2014, 3.50]
3.82mediumphysical material which serves as a functional unit, in or on which information or data is normally recorded, in which information or data can be retained and carried, from which information or data can be retrieved, and which is non-volatile in nature
NOTE 1 This definition is independent of the material nature on which the information is recorded and/or technology used to record the information, (e.g., paper, photographic, (chemical), magnetic, optical, ICs (integrated circuits), as well as other categories no longer in common use such as vellum, parchment (and other animal skins), plastics, (e.g., bakelite or vinyl), textiles, (e.g., linen, canvas), metals, etc.).
NOTE 2 The inclusion of the "non-volatile in nature" attribute is to cover latency and records retention requirements.
NOTE 3 This definition of "medium" is independent of: (a) the form or format of recorded information; (b) the physical dimension and/or size; and, (c) any container or housing that is physically separate from material being housed and without which the medium can remain a functional unit.
NOTE 4 This definition of "medium" also captures and integrates the following key properties: (a) the property of medium as a material in or on which information or data can be recorded and retrieved; (b) the property of storage; (c) the property of physical carrier; (d) the property of physical manifestation, i.e., material; (e) the property of a functional unit; and, (f) the property of (some degree of) stability of the material in or on which the information or data is recorded.
[ISO/IEC 15944-1:2011, 3.34]
3.83modelabstraction of some aspect of reality
[ISO 19115:2003, 4.9]
3.84multilingualismability to support not only character sets specific to a (natural) language (or family of languages) and associated rules but also localization requirements, i.e., use of a language from jurisdictional domain, sectoral and/or consumer marketplace perspectives
[ISO/IEC 15944-5:2014, 3.82]
48 © ISO 2014 – All rights reserved
197
169816991700
1701
1702170317041705170617071708
1709
1710
171117121713
1714
17151716171717181719
1720172117221723
1724
172517261727
1728172917301731
1732
173317341735
1736
17371738173917401741
1742
![Page 49: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/49.jpg)
CD ISO/IEC 15944-12:2014(E)
3.85mutually defined - recognized individual identity (md-rii)recognized individual identity (rii) which is mutually defined and agreed to for use between the seller and the individual, as buyer, in a business transaction
NOTE 1 The establishment of a mutually agreed to and recognized individual between a seller and individual, as buyer, does not extinguish the applicable privacy protection rights of that individual.
NOTE 2 A mutually defined recognized individual identity (md-rii) shall be established between the seller and the individual no later than the end of the negotiation phase.
NOTE 3 Use of a mutually defined recognized individual identity (md-rii) may not be permitted where external constraints apply.
[ISO/IEC 15944-8:2012, 3.80]
3.86namedesignation of an object by a linguistic expression
[ISO/IEC 11179-3:2003, 3.2.26]
3.87natural languagelanguage which is or was in active use in a community of people, and the rules of which are mainly deduced from the usage
[ISO 5217:2000, 1.1.2.02]
3.88objectanything perceivable or conceivable
NOTE Objects may be material (e.g. engine, a sheet of paper, a diamond), or immaterial (e.g. conversion ratio, a project play) or imagined, (e.g., a unicorn).
[ISO 1087-1:2000, 3.1.1]
3.89object classset of ideas, abstractions, or things in the real world that can be identified with explicit boundaries and meaning and whose properties and behaviour follow the same rules
[ISO/IEC 11179-1:2004, 3.3.22]
3.90official languageexternal constraint in the form of a natural language specified by a jurisdictional domain for official use by Persons forming part of and/or subject to that jurisdictional domain for use in communication(s) either: (a) within that jurisdictional domain; and/or, (b) among such Persons, where such communications are recorded information involving commitment(s)
NOTE 1 Unless official language requirements state otherwise, Persons are free to choose their mutually acceptable natural language and/or special language for communications as well as exchange of commitments.
NOTE 2 A jurisdictional domain decides whether or not it has an official language. If not, it will have a de facto language.
NOTE 3 An official language(s) can be mandated for formal communications as well as provision of goods and services to Persons subject to that jurisdictional domain and for use in the legal and other conflict resolution system(s) of that jurisdictional domain, etc.
© ISO 2014 – All rights reserved 49
199
1743174417451746
17471748
17491750
17511752
1753
175417551756
1757
1758175917601761
1762
176317641765
17661767
1768
1769177017711772
1773
177417751776177717781779
17801781
17821783
178417851786
![Page 50: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/50.jpg)
CD ISO/IEC 15944-12:2014(E)
NOTE 4 Where applicable, use of an official language may be required in the exercise of rights and obligations of individuals in that jurisdictional domain.
NOTE 5 Where an official language of a jurisdictional domain has a controlled vocabulary of the nature of a terminology, it may well have the characteristics of a special language. In such cases, the terminology to be used must be specified.
NOTE 6 For an official language, the writing system(s) to be used shall be specified, where the spoken use of a natural language has more than one writing system.
EXAMPLE 1 The spoken language of use of an official language may at times have more than one writing system. For example, three writing systems exist for the Inuktitut language. Canada uses two of these writing systems, namely, a Latin-1 based (Roman), the other is syllabic-based. The third is used in Russia and is Cyrillic based.
EXAMPLE 2 Norway has two official writing systems, both Latin-1 based, namely, Bokmål (Dano-Norwegian) and Nynorsk (New Norwegian).
NOTE 7 A jurisdictional domain may have more than one official language but these may or may not have equal status.
EXAMPLE Canada has two official languages, Switzerland has three, while the Union of South Africa has eleven official languages.
NOTE 8 The BOV requirement of the use of a specified language will place that requirement on any FSV supporting service.
EXAMPLE A BOV requirement of Arabic, Chinese, Russian, Japanese, Korean, etc., as an official language requires the FSV support service to be able to handle the associated character sets.
[ISO/IEC 15944-5:2014, 3.87]
3.91Open-edielectronic data interchange among multiple autonomous Persons to accomplish an explicit shared business goal according to Open-edi standards
[ISO/IEC 14662:2010, 3.14]
3.92Open-edi Description Technique (OeDT)specification method such as a Formal Description Technique, another methodology having the characteristics of a Formal Description Technique, or a combination of such techniques as needed to formally specify BOV concepts, in a computer processable form
[ISO/IEC 14662:2010, 3.16]
3.93Open-edi dispositionprocess governing the implementation of formally approved records retention, destruction (or expungement) or transfer of recorded information under the control of a Person which are documented in a records scheduling and disposition authority (ies) or similar instrument of the organization
NOTE Adapted from ISO 15489-1, 3.9.
[ISO/IEC 15944-5:2014, 3.90]
3.94Open-edi Party (OeP)Person that participates in Open-edi
NOTE Often referred to generically in this and other eBusiness standards, (e.g., parts of ISO/IEC 15944 multipart “eBusiness standard) as "party" or "parties" for any entity modelled as a Person as playing a role in Open-edi scenarios.
[ISO/IEC 14662:2010, 3.17]
50 © ISO 2014 – All rights reserved
201
17871788
178917901791
17921793
179417951796
17971798
1799
18001801
18021803
18041805
1806
1807180818091810
1811
18121813181418151816
1817
18181819182018211822
1823
1824
182518261827
18281829
1830
![Page 51: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/51.jpg)
CD ISO/IEC 15944-12:2014(E)
3.95Open-edi record retention and disposal schedule (Oe-RRDS)specification of a period of time that a set of recorded information (SRI) shall be retained by a Person in order to meet operational, legal, regulatory, fiscal or other requirements as specified in the external constraints (or internal constraints) applicable to a Person who is a party to a business transaction
[ISO/IEC 15944-5:2014, 3.92]
3.96Open-edi systeminformation technology system (IT System) which enables an Open-edi Party to participate in Open-edi transactions
[ISO/IEC 14662:2010, 3.22]
3.97organizationunique framework of authority within which a person or persons act, or are designated to act, towards some purpose
NOTE The kinds of organizations covered by this International Standard include the following examples:
EXAMPLE 1 An organization incorporated under law.
EXAMPLE 2 An unincorporated organization or activity providing goods and/or services including: (a) partnerships; (b) social or other non-profit organizations or similar bodies in which ownership or control is vested in a group of individuals; (c) sole proprietorships; and, (d) governmental bodies.
EXAMPLE 3 Groupings of the above types of organizations where there is a need to identify these in information interchange.
[ISO/IEC 6523-1: 1998, 3.1]
3.98organization partany department, service or other entity within an organization, which needs to be identified for information interchange
[ISO/IEC 6523-1:1998, 3.2]
3.99organization Personorganization part which has the properties of a Person and thus is able to make commitments on behalf of that organization
NOTE 1 An organization can have one or more organization Persons.
NOTE 2 An organization Person is deemed to represent and act on behalf of the organization and to do so in a specified capacity.
NOTE 3 An organization Person can be a "natural person" such as an employee or officer of the organization.
NOTE 4 An organization Person can be a legal person, i.e., another organization.
[ISO/IEC 15944-1:2011, 3.46]
3.100Personentity, i.e., a natural or legal person, recognized by law as having legal rights and duties, able to make commitment(s), assume and fulfil resulting obligation(s), and able of being held accountable for its action(s)
© ISO 2014 – All rights reserved 51
203
18311832183318341835
1836
1837183818391840
1841
1842184318441845
1846
1847
184818491850
18511852
1853
1854185518561857
1858
1859186018611862
1863
18641865
1866
1867
1868
1869187018711872
![Page 52: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/52.jpg)
CD ISO/IEC 15944-12:2014(E)
NOTE 1 Synonyms for "legal person" include "artificial person", "body corporate", etc., depending on the terminology used in competent jurisdictions.
NOTE 2 Person is capitalized to indicate that it is being used as formally defined in the standards and to differentiate it from its day-to-day use.
NOTE 3 Minimum and common external constraints applicable to a business transaction often require one to differentiate among three common subtypes of Person, namely "individual", "organization", and "public administration".
[ISO/IEC 14662:2010, 3.24]
3.101Person authenticationprovision of the assurance of a recognized Person identity (rPi) (sufficient for the purpose of the business transaction) by corroboration
[ISO/IEC 15944-1:2011, 3.48]
3.102personaset of data elements and their values by which a Person wishes to be known and thus identified in a business transaction
[ISO/IEC 15944-1:2011, 3.51]
3.103persona Registration Schema (pRS)formal definition of the data fields contained in the specification of a persona of a Person and the allowable contents of those fields, including the rules for the assignment of identifiers
NOTE This may also be referred to as a persona profile of a Person.
[ISO/IEC 15944-1:2011, 3.52]
3.104personal informationany information on or about an identifiable individual that is recorded in any form, including electronically or on paper
NOTE Recorded information about a person's religion, age, financial transactions, medical history, address, or blood type.
[ISO/IEC 15944-5:2014, 3.103]
3.105Person identity (Pi)combination of persona information and identifier used by a Person in a business transaction
[ISO/IEC 15944-1:2011, 3.49]
3.106Person signaturesignature, i.e., a name representation, distinguishing mark or usual mark, which is created by and pertains to a Person
[ISO/IEC 15944-1:2011, 3.50]
52 © ISO 2014 – All rights reserved
205
18731874
18751876
18771878
1879
1880188118821883
1884
1885188618871888
1889
1890189118921893
1894
1895
1896189718981899
19001901
1902
190319041905
1906
1907190819091910
1911
![Page 53: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/53.jpg)
CD ISO/IEC 15944-12:2014(E)
3.107personal information filing systemany structured set of personal information which is accessible according to specific criteria, whether centralized, decentralized or dispersed on a functional or geographical basis
[ISO/IEC 15944-8:2012,, 3.103]
3.108physical addressaddress that is used/recognized by a postal authority and/or courier service to deliver information item(s), material object(s), or business object(s) to a Contact at either an actual address or a pick-up point address, (e.g., P.O. Box, rural route, etc.)
[ISO/IEC 15944-2:2014, 3.80]
3.109pivot code setset of ID codes in a coded domain which is made publicly known and available, the most stable, representing the defined semantics (most often it is the same as the ID code)
NOTE 1 The use of the pivot code set as distinguished from the ID code supports the requirement of a Source Authority to maintain internally and on a confidential basis the ID code of its members.
NOTE 2 At times a coded domain has more than one valid code set, (e.g., ISO 639, ISO 3166, etc.).
EXAMPLE In ISO 3166-1 the 3-digit numeric code set is the pivot. The 2-alpha and 3-alpha code sets can change when the name of the entity referenced is changed by that entity.
[ISO/IEC 15944-5:20014, 3.104]
3.110pivot ID codemost stable ID code assigned to identify a member of a coded domain where more than one ID code may be assigned and/or associated with a member of that coded domain
EXAMPLE ISO 3166-1:2006 contains three code sets: (a) a three-digit numeric code; (b) a two-alpha code; and, (c) a three-alpha code. The three-digit numeric code set serves as the pivot ID code. It is the most stable, remains the same even though the two alpha and/or three alpha codes may and do change.
[ISO/IEC 15944-5:2014, 3.105]
3.111principlefundamental, primary assumption and quality which constitutes a source of action determining particular objectives or results
NOTE 1 A principle is usually enforced by rules that affect its boundaries.
NOTE 2 A principle is usually supported through one or more rules.
NOTE 3 A principle is usually part of a set of principles which together form a unified whole.
EXAMPLE Within a jurisdictional domain, examples of a set of principles include a charter, a constitution, etc.
[ISO/IEC 15944-2:2014, 3.81]
3.112privacy collaboration space (PCS)modelling or inclusion of an Open-edi scenario of a collaboration space involving an individual as the buyer in a potential or actualized business transaction where the buyer is an individual and therefore
© ISO 2014 – All rights reserved 53
207
1912191319141915
1916
19171918191919201921
1922
1923192419251926
19271928
1929
19301931
1932
1933193419351936
193719381939
1940
1941194219431944
1945
1946
1947
1948
1949
1950195119521953
![Page 54: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/54.jpg)
CD ISO/IEC 15944-12:2014(E)
privacy protection requirements apply to personal information of that individual provided in that business transaction
[ISO/IEC 15944-8:2012, 3.107]
3.113privacy protectionset of external constraints of a jurisdictional domain pertaining to recorded information on or about an identifiable individual, i.e., personal information, with respect to the creation, collection, management, retention, access and use and/or distribution of such recorded information about that individual including its accuracy, timeliness, and relevancy
NOTE 1 Recorded information collected or created for a specific purpose on an identifiable individual, i.e., the explicitly shared goal of the business transaction involving an individual, shall not be used for another purpose without the explicit and informed consent of the individual to whom the recorded information pertains.
NOTE 2 Privacy requirements include the right of an individual to be able to view the recorded information about him/her and to request corrections to the same in order to ensure that such recorded information is accurate and up-to-date, or have it deleted.
NOTE 3 Where jurisdictional domains have legal requirements which override privacy protection requirements these must be specified, (e.g., national security, investigations by law enforcement agencies, etc.).
[ISO/IEC 15944-5:2014, 3.109]
3.114privacy protection officer (PPO)organization Person authorized by the organization to act on behalf of that organization and entrusted by the organization as the officer responsible for the overall governance and implementation of the privacy protection requirements for information life cycle management not only within that organization but also with respect to any electronic data interchange of personal information on the individual concerned with parties to the business transaction, including a regulator where required, as well as any agents, third parties involved in that business transaction
[ISO/IEC 15944-8:2012, 3.105]
3.115processseries of actions or events taking place in a defined manner leading to the accomplishment of an expected result
[ISO/IEC 15944-1:2011, 3.53]
3.116processing of personal informationany operation or set of operations which is performed upon personal data, whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction
[ISO/IEC 15944-8:2012, 3.111]
3.117propertypeculiarity common to all members of an object class
[ISO/IEC 11179-1:2004, 3.3.29]
54 © ISO 2014 – All rights reserved
209
19541955
1956
195719581959196019611962
196319641965
196619671968
19691970
1971
19721973197419751976197719781979
1980
1981198219831984
1985
198619871988198919901991
1992
199319941995
1996
![Page 55: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/55.jpg)
CD ISO/IEC 15944-12:2014(E)
3.118pseudonymuse of a persona or other identifier by an individual which is different from that used by the individual with the intention that it be not linkable to that individual
NOTE Adapted from ISO TS 25237.
[ISO/IEC 15944-8:2012, 3.113]
3.119pseudonymizationparticular type of anonymization that removes the association with an individual and adds an association between a particular set of characteristics relating to the individual and one more pseudonym
NOTE Adapted from ISO TS 25237.
[ISO/IEC 15944-8:2012, 3.114]
3.120public administrationentity, i.e., a Person, which is an organization and has the added attribute of being authorized to act on behalf of a regulator
[ISO/IEC 15944-1:2011, 3.54]
3.121public policycategory of external constraints of a jurisdictional domain specified in the form of a right of an individual or a requirement of an organization and/or public administration with respect to an individual pertaining to any exchange of commitments among the parties concerned involving a good, service and/or right including information management and interchange requirements
NOTE 1 Public policy requirements may apply to any one, all or combinations of the fundamental activities comprising a business transaction, i.e., planning, identification, negotiation, actualization and post-actualization. (See further Clause 6.3 "Rules governing the process component" in ISO/IEC 15944-1:2011)
NOTE 2 It is up to each jurisdictional domain to determine whether or not the age of an individual qualifies a public policy requirement, (e.g., those which specifically apply to an individual under the age of thirteen as a "child"), those which require an individual to have attained the age of adulthood, (e.g., 18 years or 21 years of age) of an individual to be able to make commitments of a certain nature.
NOTE 3 Jurisdictional domains may have consumer protection or privacy requirements which apply specifically to individuals who are considered to be "children", "minors", etc. (e.g. those who have not reached their 18th or 21st birthday according to the rules of the applicable jurisdictional domain).
[ISO/IEC 15944-5:2014, 3.113]
3.122publicly available personal information (PAPI)personal information about an individual that the individual knowingly makes or permits to be made available to the public, or is legally obtained and accessed from: (1) government records that are available to the public; or, (2) information required by law to be made available to the public
EXAMPE 1 Personal information which an individual knowingly makes or permits to be made available include public telephone directories, advertisements in newspapers, published materials, postings of this nature on the internet, etc.
EXAMPLE 2 Government records that are publicly available include registers of individuals who are entitled to vote, buy or sell a property, or any other personal information that a jurisdictional domain requires to be publicly available, etc.
[ISO/IEC 15944-8:2012, 3.117]
© ISO 2014 – All rights reserved 55
211
1997199819992000
2001
2002
2003200420052006
2007
2008
2009201020112012
2013
201420152016201720182019
202020212022
2023202420252026
202720282029
2030
20312032203320342035
20362037
20382039
2040
![Page 56: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/56.jpg)
CD ISO/IEC 15944-12:2014(E)
3.123recognized individual identity (rii)identity of an individual, i.e., individual identity, established to the extent necessary for the specific purpose of a business transaction
[ISO/IEC 15944-8:2012, 3.116]
3.124recognized individual name (RIN)persona of an individual having the properties of a legally recognized name (LRN)
NOTE 1 On the whole, a persona presented by an individual should have a basis in law (or recognized jurisdictional domain) in order to be considered as the basis for a recognized individual name (RIN).
NOTE 2 An individual may have more than one RIN and more than one RIN at the same time.
NOTE 3 The establishment of a RIN is usually accompanied by the assignment of a unique identifier, i.e. by the jurisdictional domain (or public administration) which recognizes the persona as a RIN.
[ISO/IEC 15944-5:2014, 3.114]
3.125recognized Person identity (rPi)identity of a Person, i.e., Person identity, established to the extent necessary for a specific purpose in a business transaction
[ISO/IEC 15944-1:2011, 3.55]
3.126recorded informationinformation that is recorded on or in a medium irrespective of form, recording medium or technology used, and in a manner allowing for storage and retrieval
NOTE 1 This is a generic definition and is independent of any ontology, (e.g., those of "facts" versus "data" versus "information" versus "intelligence" versus "knowledge", etc.).
NOTE 2 Through the use of the term "information," all attributes of this term are inherited in this definition.
NOTE 3 This definition covers: (a) any form of recorded information, means of recording, and any medium on which information can be recorded; and, (b) all types of recorded information including all data types, instructions or software, databases, etc.
[ISO/IEC 15944-1:2011, 3.56]
3.127registerset of files containing identifiers assigned to items with descriptions of the associated items
[ISO 19135:2005, 4.1.9]
3.128registrationrule-based process, explicitly stated, involving the use of one or more data elements, whose value (or combination of values) is used to identify uniquely the results of assigning an OeRI
[ISO/IEC 15944-2:2014, 3.95]
3.129Registration Authority (RA)Person responsible for the maintenance of one or more Registration Schemas (RS) including the assignment of a unique identifier for each recognized entity in a Registration Schema (RS)
56 © ISO 2014 – All rights reserved
213
2041204220432044
2045
204620472048
20492050
2051
20522053
2054
2055205620572058
2059
2060206120622063
20642065
2066
206720682069
2070
207120722073
2074
2075207620772078
2079
2080208120822083
![Page 57: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/57.jpg)
CD ISO/IEC 15944-12:2014(E)
[ISO/IEC 15944-1:2011, 3.57]
3.130Registration Authority Identifier (RAI)identifier assigned to a Registration Authority (RA)
[ISO/IEC 11179-1:2004, 3.3.32]
3.131Registration Schema (RS)formal definition of a set of rules governing the data fields for the description of an entity and the allowable contents of those fields, including the rules for the assignment of identifiers
[ISO/IEC 15944-1:2011, 3.58]
3.132Registration Schema (based) –recognized individual identity (RS-rii)recognized individual identity (rii) for use in a business transaction, by the buyer as an individual, which is one based on the use by an individual as a member of a specified Registration Schema (RS) of a particular Registration Authority (RA)
[ISO/IEC 15944-8:2012, 3.127]
3.133registryinformation system on which a register is maintained
[ISO19135:2005, 4.1.13]
3.134regulatorPerson who has authority to prescribe external constraints which serve as principles, policies or rules governing or prescribing the behaviour of Persons involved in a business transaction as well as the provisioning of goods, services, and/or rights interchanged
[ISO/IEC 15944-1:2011, 3.59]
3.135regulatory business transaction (RBT)class of business transactions for which the explicitly shared goal has been established and specified by a jurisdictional domain, as a Person in the role of a regulator
NOTE 1 A regulatory business transaction (RBT) can itself be modelled as a stand-alone business transaction and associated scenario(s).
EXAMPLE The filing of a tax return, the making of a customs declaration, the request for and issuance of a license, the provision of a specified service of a public administration, a mandatory filing of any kind with a regulator, etc.
NOTE 2 A regulatory business transaction (modelled as a scenario) can form part of another business transaction.
NOTE 3 A RBT may apply to a seller only, a buyer only or both, as well as any combination of parties to a business transaction.
NOTE 4 A RBT may require or prohibit the use of an agent or third party.
NOTE 5 A regulatory business transaction (RBT) may be specific to the nature of the good, services and/or right forming part of a business transaction.
[ISO/IEC 15944-5:2014, 3.124]
© ISO 2014 – All rights reserved 57
215
2084
208520862087
2088
2089209020912092
2093
20942095209620972098
2099
210021012102
2103
21042105210621072108
2109
2110211121122113
21142115
21162117
2118
21192120
2121
21222123
2124
![Page 58: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/58.jpg)
CD ISO/IEC 15944-12:2014(E)
3.136retention periodlength of time for which data on a data medium is to be preserved
[ISO/IEC 2382-12:1988, 12.04.11]
3.137rolespecification which models an external intended behaviour (as allowed within a scenario) of an Open-edi Party
[ISO/IEC 14662:2010, 3.25]
3.138rulestatement governing conduct, procedure, conditions and relations.
NOTE 1 Rules specify conditions that must be complied with. These may include relations among objects and their attributes.
NOTE 2 Rules are of a mandatory or conditional nature.
NOTE 3 In Open-edi, rules formally specify the commitment(s) and role(s) of the parties involved, and the expected behaviour(s) of the parties involved as seen by other parties involved in (electronic) business transactions. Such rules are applied to: (a) content of the information flows in the form of precise and computer-processable meaning, i.e. the semantics of data; and, (b) the order and behaviour of the information flows themselves.
NOTE 4 Rules must be clear and explicit enough to be understood by all parties to a business transaction. Rules also must be capable of being able to be specified using a using a Formal Description Technique(s) (FDTs).
EXAMPLE A current and widely used FDT is "Unified Modelling Language (UML)".
NOTE 5 Specification of rules in an Open-edi business transaction should be compliant with the requirements of ISO/IEC 15944-3 "Open-edi Description Techniques (OeDT)".
[ISO/IEC 15944-2:2014, 3.101]
3.139rulebasepre-established set of rules which interwork and which together form an autonomous whole
NOTE One considers a rulebase to be to rules as database is to data.
[ISO/IEC 15944-2:2014, 3.102]
3.140SC identifierunique, linguistically neutral, unambiguous, referenceable identifier of a Semantic Component
[ISO/IEC 15944-2:2014, 3.107]
3.141scenario attributeformal specification of information, relevant to an Open-edi scenario as a whole, which is neither specific to roles nor to Information Bundles
[ISO/IEC 14662:2010, 3.26]
58 © ISO 2014 – All rights reserved
217
212521262127
2128
2129213021312132
2133
213421352136
21372138
2139
2140214121422143
21442145
2146
21472148
2149
215021512152
2153
2154
215521562157
2158
2159216021612162
2163
![Page 59: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/59.jpg)
CD ISO/IEC 15944-12:2014(E)
3.142scenario componentone of the three fundamental elements of a scenario, namely role, Information Bundle, and Semantic Component
[ISO/IEC 15944-2:2014, 3.104]
3.143scenario contentset of recorded information containing registry entry identifiers, labels and their associated definitions and related recorded information posted (or reposted) in any registry for business objects
[ISO/IEC 15944-2:2014, 3.105]
3.144scenario specification attributeany attribute of a scenario, role, Information Bundle, and/or Semantic Component
[ISO/IEC 15944-2 2014, 3.106]
3.145sellerPerson who aims to hand over voluntarily or in response to a demand, a good, service and/or right to another Person and in return receives an acceptable equivalent value, usually in money, for the good, service and/or right provided
[ISO/IEC 15944-1:2011, 3.62]
3.146Semantic Component (SC)unit of recorded information unambiguously defined in the context of the business goal of the business transaction
NOTE A SC may be atomic or composed of other SCs.
[ISO/IEC 14662:2010, 3.27]
3.147semantic identifier (SI)IT-interface identifier for a semantic component or other semantic for which (1) the associated context, applicable rules and/or possible uses as a semantic are predefined and structured and the Source Authority for the applicable rulebase is identified and (2) for which more than one or more Human Interface Equivalents(HIEs) exist
NOTE The identifier for a Semantic Component (SC), an Information Bundle (IB) and/or an ID code for which one or more human interface equivalents (HIEs) exist are considered to have the properties or behaviours of semantic identifiers.
[ISO/IEC 15944-5:2014, 3.136]
3.148set of personal information (SPI)set of recorded information (SRI) which is of the nature of or contains personal information
3.149set of recorded information (SRI)recorded information of an organization or public administration, which is under the control of the same and which is treated as a unit in its information life cycle
NOTE 1 A SRI can be a physical or digital document, a record, a file, etc., that can be read, perceived or heard by a person or computer system or similar device.
© ISO 2014 – All rights reserved 59
219
2164216521662167
2168
2169217021712172
2173
217421752176
2177
21782179218021812182
2183
2184218521862187
2188
2189
219021912192219321942195
21962197
2198
21992200220122022203220422052206
22072208
![Page 60: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/60.jpg)
CD ISO/IEC 15944-12:2014(E)
NOTE 2 A SRI is a unit of recorded information that is unambiguously defined in the context of the business goals of the organization, i.e., a semantic component.
NOTE 3 A SRI can be self-standing (atomic), or a SRI can consist of a bundling of two or more SRIs into another “new” SRI. Both types can exist simultaneously within the information management systems of an organization.
[ISO/IEC 15944-5:2014, 3.137]
3.150Source Authority (SA)Person recognized by other Persons as the authoritative source for a set of constraints
NOTE 1 A Person as a Source Authority for internal constraints may be an individual, organization, or public administration.
NOTE 2 A Person as Source Authority for external constraints may be an organization or public administration.
EXAMPLE In the field of air travel and transportation, IATA as a Source Authority, is an "organization," while ICAO as a Source Authority, is a "public administration".
NOTE 3 A Person as an individual shall not be a Source Authority for external constraints.
NOTE 4 Source Authorities are often the issuing authority for identifiers (or composite identifiers) for use in business transactions.
NOTE 5 A Source Authority can undertake the role of Registration Authority or have this role undertaken on its behalf by another Person.
NOTE 6 Where the sets of constraints of a Source Authority control a coded domain, the SA have the role of a coded domain Source Authority.
[ISO/IEC 15944-2:2014, 3.109]
3.151special languagelanguage for special purposes (LSP), language used in a subject field and characterized by the use of specific linguistic means of expression
NOTE The specific linguistic means of expression always include subject-specific terminology and phraseology and also may cover stylistic or syntactic features.
[ISO 1087-1:2000, 3.1.3]
3.152SRI destructionprocess of eliminating or deleting sets of recorded information, beyond any possible reconstruction
3.153SRI expungementprocess of eliminating completely, wiping out, destroying or obliterating completely a physical or (electronic) digital set of recorded information (SRI) without so that there can be no reconstruction
3.153SRI integrity(of records) reliability and trustworthiness of SRIs as copies, duplicates or comparable representations of SRIs; and reliability and trustworthiness of the IT system in which it was recorded or stored to produce reliable and trustworthy copies and duplicates of SRIs
NOTE 1 SRI integrity is important in the electronic records provisions of the evidence acts in the phrases “the integrity of the electronic records system” and “the integrity of the electronic record.” However, the term integrity is not defined. In the
60 © ISO 2014 – All rights reserved
221
22092210
22112212
2213
221422152216
22172218
2219
22202221
2222
22232224
22252226
22272228
2229
2230223122322233
22342235
2236
223722382239
22402241224222432244224522462247224822492250
22512252
![Page 61: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/61.jpg)
CD ISO/IEC 15944-12:2014(E)
absence of a statutory or judicially created definition, the principles of this standard shall serve as an operational definition of the word integrity used in the evidence acts.
NOTE 2 Certain evidence acts provide that the integrity of the electronic record may be proved by evidence of reliable encryption.
3.155SRI life cyclestages in the life cycle of a SRI include but are not limited to its planning, creation and organization; the receipt and capture of data; the retrieval, processing, dissemination and distribution of a SRI; its storage, maintenance and protection; its archival preservation or destruction or expungement
3.156SRI migrationact of moving a SRI from one IT system to another Person within an organization or public administration while maintaining the authenticity, integrity, reliability and usability of the SRI
3.157SRI retention periodspecified period of time that SRIs are kept by a Person in order to meet operational, legal, regulatory, fiscal or other requirements
3.158standarddocumented agreement containing technical specifications or other precise criteria to be used consistently as rules, guidelines, or definitions of characteristics, to ensure that materials, products, processes and services are fit for their purpose
NOTE This is the generic definition of “standard” of the ISO and IEC (and now found in the ISO/IEC JTC1 Directives, Part 1, Section 2.5:1998). (See also ISO/IEC Guide 2:1996 (1.7)
[ISO/IEC 15944-1:2011, 3.64]
3.159termdesignation of a defined concept in a special language by a linguistic expression
NOTE A term may consist of one or more words i.e. simple term, or complex term or even contain symbols.
[ISO 1087-1:2000, 3.4.3]
3.160textdata in the form of characters, symbols, words, phrases, paragraphs, sentences, tables, or other character arrangements, intended to convey a meaning and whose interpretation is essentially based upon the reader's knowledge of some natural language or artificial language
EXAMPLE A business letter printed on paper or displayed on a screen.
[ISO/IEC 2382-23:1994, 23.01.01]
3.161third partyPerson besides the two primarily concerned in a business transaction who is agent of neither and who fulfils a specified role or function as mutually agreed to by the two primary Persons or as a result of external constraints
NOTE It is understood that more than two Persons can at times be primary parties in a business transaction.
[ISO/IEC 15944-1:2011, 3.65]
© ISO 2014 – All rights reserved 61
223
22532254
22552256
22572258225922602261
226222632264226522662267226822692270
22712272227322742275
22762277
2278
227922802281
2282
2283
22842285228622872288
2289
2290
22912292229322942295
2296
2297
![Page 62: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/62.jpg)
CD ISO/IEC 15944-12:2014(E)
3.162transitory recordSRI that is required only for a very limited and specified (retention period) time to ensure the completion of a routine action or the preparation of a subsequent SRI
NOTE A transitory SRI is expunged at the end of a short existence.
3.163treatyinternational agreement concluded among jurisdictional domains in written form and governed by international law
NOTE 1 On the whole a treaty is concluded among UN member states.
NOTE 2 Treaties among UN member states when coming into force are required to be transmitted to the Secretariat of the United Nations for registration or filing or recording as the case may be and for publication. (See further Article 80 or the Charter of the UN)
NOTE 3 Treaties can also be entered into by jurisdictional domains other than UN member states, i.e. non-members such as international organizations and the rare sub-national units of federations which are constitutionally empowered to do so.
NOTE 4 A treaty can be embodied in a single instrument or in two or more related instruments and whatever its particular designations. However, each treaty is a single entity.
NOTE 5 Jurisdictional domains can make agreements which they do not mean to be legally binding such as for reasons of administrative convenience or expressions of political intent only, (e.g., as a Memorandum of Understanding (MOU)).
NOTE 6 Adapted from the Vienna Convention on the Law of Treaties, 1(a).
[ISO/IEC 15944-5:2014, 3.144]
3.164truncated nameshort form of a name or persona of a Person resulting from the application of a rule-based truncation process
[ISO/IEC 15944-5:2014, 3.145]
3.165truncated recognized name (TRN)truncated name, i.e., persona, of a Person which has the properties of a legally recognized name (LRN)
NOTE 1 Truncated recognized name(s) may be required for use in machine-readable travel documents, (e.g., passports or visas), identity tokens, drivers’ licenses, Medicare cards, etc.).
NOTE 2 The source of a truncated recognized name may be a legally recognized name (LRN).
[ISO/IEC 15944-5:2014, 3.146]
3.166truncationrule-base process, explicitly stated, for shortening an existing name of an entity to fit within a predefined maximum length (of characters)
NOTE Truncation may be required for the use of names in IT systems, electronic data interchange (EDI), the use of labels in packaging, in the formation of a Person identity (Pi), recognized Person identity (rPi), etc.
[ISO/IEC 15944-5:2014, 3.147]
62 © ISO 2014 – All rights reserved
225
229822992300230123022303
2304230523062307
2308
230923102311
231223132314
23152316
231723182319
2320
2321
2322232323242325
2326
232723282329
23302331
2332
2333
2334233523362337
23382339
2340
![Page 63: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/63.jpg)
CD ISO/IEC 15944-12:2014(E)
3.167unambiguouslevel of certainty and explicitness required in the completeness of the semantics of the recorded information interchanged appropriate to the goal of a business transaction
[ISO/IEC 15944-1:2011, 3.66]
3.168vendorseller on whom consumer protection requirements are applied as a set of external constraints on a business transaction
NOTE 1 Consumer protection is a set of explicitly defined rights and obligations applicable as external constraints on a business transaction.
NOTE 2 It is recognized that external constraints on a seller of the nature of consumer protection may be peculiar to a specified jurisdictional domain.
[ISO/IEC 15944-1:2011, 3.67]
3.169vocabularyterminological dictionary which contains designations and definitions for one or more specific subject fields
NOTE The vocabulary may be monolingual, bilingual or multilingual.
[ISO 1087-1:2000, 3.7.2]
© ISO 2014 – All rights reserved 63
227
2341234223432344
2345
2346234723482349
23502351
23522353
2354
235523562357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
![Page 64: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/64.jpg)
CD ISO/IEC 15944-12:2014(E)
THIS PAGE INTENTIONALLY LEFT BLANK
64 © ISO 2014 – All rights reserved
229
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
![Page 65: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/65.jpg)
CD ISO/IEC 15944-12:2014(E)
4 Symbols and abbreviations
Project Co-Editors’ Notes:
1. The entries in Clause 4 will be reviewed and amended in the preparation of the next ballo0t version of this document.
2. In order to facilitate the referencing of the various Parts of ISO/IEC 15944, as well as there Clauses or sub-clauses, each of the Parts has been is represented by its acronym, i.e., as Part 1, Part 2, etc. {See further below}
For the purposes of this document, the following symbols and abbreviations apply.
Acronym Description
API Application Programming Interface
ATI Access to Information
BOV Business Operational View
BTI Business Transaction Identifier
BTM Business Transaction Model
cdRS coded domain Registration Schema
cdSA coded domain Source Authority
CV controlled vocabulary
DMA Decision Making Application
DMA Interface Decision Making Application Interface
EC European Community
EDI Electronic Data Interchange
EU European Union
FDT Formal Description Technique
FOI Freedom of Information
FSV Functional Service View
HIE Human Interface Equivalent
IB Information Bundle
ILCM Information life cycle management
IEC International Electrotechnical Commission
ii individual identity
IPD Information Processing Domain
ipRS individual persona Registration Schema
© ISO 2014 – All rights reserved 65
231
2388
2389
23902391
239223932394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
![Page 66: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/66.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO International Organization for Standardization
IT System Information Technology System
ITU International Telecommunications Union
ITU-R International Telecommunications Union – Radiocommunications Sector
ITU-T International Telecommunications Union – Telecommunications Sector
JTC1 Joint Technical Committee 1 “Information Technology” (of the ISO and IEC)
LRL legally recognized language
LRN legally recognized name (NRL nom reconnu legalement)
md-rii mutually defined – recognized individual identity
OeBTO Open-edi Business Transaction Ontology
OeDT Open-edi Descriptive Techniques
OeORI Open-edi Registration Organization Identifier
OeP Open-edi Party
OeR Open-edi Registry
OeRA Open-edi Registration Authority
OeRI Open-edi Registry Item
OeRO Open-edi Registration Organization
Oe-RRDS Open-edi records retention and disposal schedule
OeS Open-edi scenario
OeSI Open-edi Support Infrastructure
PAPI publicly available personal information
Part 1 ISO/IEC 15944-1
Part 2 ISO/IEC 15944-2
Part 4 ISO/IEC 15944-4
Part 5 ISO/IEC 15944-5
Part 7 ISO/IEC 15944-7
Part 8 ISO/IEC 15944-8
Part 9 ISO/IEC 15944-9
Part 10 ISO/IEC 15944-10
Part 12 ISO/IEC 15944-12
PCS privacy collaboration space
66 © ISO 2014 – All rights reserved
233
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
![Page 67: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/67.jpg)
CD ISO/IEC 15944-12:2014(E)
pRS persona Registration Schema
RA Registration Authority
RAI Registration Authority Identifier
RBT Regulatory Business Transaction
rii recognized individual identity
RIN Recognized Individual Name
rPi recognized Person identity
RA Registration Authority
RS Registration Schema
RS-rii Registration Schema (based) – recognized individual identity
SA Source Authority
SC Semantic Component
SI Semantic Identifier
SRI set of recorded information
TRN truncated recognized name
UML Unified Modelling Language
UN United Nations
© ISO 2014 – All rights reserved 67
235
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
![Page 68: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/68.jpg)
CD ISO/IEC 15944-12:2014(E)
THIS PAGE INTENTIONALLY LEFT BLANK
68 © ISO 2014 – All rights reserved
237
2468
2469
2470
2471
2472
2473
2474
![Page 69: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/69.jpg)
CD ISO/IEC 15944-12:2014(E)
5 Fundamental privacy protection principles
5.1 Introduction
This Clause 5 is an abridged and summarized version of the full and complete text of that found in Clause 5 of ISO/IEC 15944-8 on which it is based. The rules found in Clause 5 of Part 8 are found in Annex B.7 (normative) “Consolidated set of rules in existing Parts of ISO/IEC 15944 of particular relevance to privacy protection requirements of an ILCM nature”.. This Clause 5 has a particular focus, i.e., those pertaining to the scope and purpose of this Part 12.
Rule 001:The rules stated in Annex B (normative) of other Parts of ISO/IEC 15944, and in particular those of ISO/IEC 15944-8, are relevant and apply to this Part 12.
5.2 Primary sources of privacy protection principles
The figure presented below is a copy from Clause 5.1 Figure 3 in Part 8. It is repeated in Part 12 to provide an overview of the sources of requirements of the privacy protection principles. They also apply to this Part 12.
Figure 3 — Primary sources for privacy protection principles
© ISO 2014 – All rights reserved 69
Primary Sources for Privacy Protection Principles
International External Constraints
OECD GuidelinesDirective 95/46/EC of the European Parliament2005 APEC Framework
(Common) Laws & Regs. of UN member states of a Privacy Protection nature & of their admin. units, (e.g., states, provinces, länder, etc., at whatever level) (including external constraints of localization requirements nature)
Relevant added public policy requirements of jurisdictional domains, (e.g., consumer protection, individual accessibility) requirements/standards of a jurisdictional domain
Privacy & Data Commissioners
GuidelinesPublicationstoolsrulingsetc.
Relevant international ISO standards
Eleven (11) Privacy protection Principles
eBusiness & user –driven req’mts (of a BOV nature)
Clause 5ISO/IEC 15944-8
239
2475
2476
24772478247924802481
2482248324842485
2486
248724882489
2490
![Page 70: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/70.jpg)
CD ISO/IEC 15944-12:2014(E)
5.3 Key eleven (11) privacy protection principles
Clause 5.3 “Fundamental privacy protection principles” in Part 8 provides eleven (11) principles, rules and associated text. All apply to this Part 12. The eleven (11) privacy protection principles are:
Privacy protection principle 1: Preventing harm Privacy protection principle 2: Accountability Privacy protection principle 3: Identifying purposes Privacy protection principle 4: Informed consent Privacy protection principle 5: Limiting collection Privacy protection principle 6: Limiting use, disclosure and retention Privacy protection principle 7: Accuracy Privacy protection principle 8: Safeguards Privacy protection principle 9: Openness Privacy protection principle 10: Individual access Privacy protection principle 11: Challenging compliance
These eleven (11) Privacy Protection principles are placed in a business transaction context, i.e. that of the parties making a commitment on a commonly agreed upon goal for a business transaction.
From a FSV perspective, this includes ensuring that the IT systems of an organization are able to and do provide associated required technical implementation measures which must be capable of exchanging the necessary information among the parties to a business transaction. This is necessary to be able to determine when personal information is to be processed as against all other (non-personal) recorded information forming part of the business transaction. This includes ensuring that applicable controls are in place in the Decision Making Applications (DMAs) of the IT systems of organizations (and public administrations) where personal information is processed and interchanged among all parties to a business transaction30.
Finally, the privacy protection principles enumerated above represent a whole and should be interpreted and implemented as a whole and not piecemeal. Implementers of this standards should be aware that in subsequent clauses of this part of ISO/IEC 15944, two or more of the privacy protection principles referenced may be instantiated simultaneously.
5.4 Privacy protection principles in the context of ILCM requirements
The purpose of this Clause 5.4 is to supplement from an ILCM perspective, the rules and associated text from each of the eleven privacy protection principles which are already specified in Clause 5.3 of Part 8.
5.4.1 Privacy protection principle 1: Preventing harm31
Rule 002:Any personal information which is not accurate, timely, or relevant should not be entered, or if entered, expunged immediately from the IT system of the Open-edi party, and the IT system of all the Persons with which the Open-edi party shared such personal information.
Guideline 002G1:Any personal information of the nature identified in Rule 002 should be expunged immediately or at the minimum no later than as part of the information update cycle of the relevant DMA (or IT system) of the seller (and its agents).
30 On Decision Making Applications (DMAs), Information Processing Domain (IPD) and Open-edi Support Infrastructure (OeSI) in IT systems, see further Clause 5.2 Functional Service View in ISO/IEC 14662:2010 (3rd edition) and its Figure 3 Open-edi system relationships.
31 This Clause and its rules complement those of Part 8, Clause 5.3.1 which apply here.
70 © ISO 2014 – All rights reserved
241
2491
24922493
24942495249624972498249925002501250225032504
25052506
25072508250925102511251225132514
2515251625172518
2519
25202521
2522
2523252425252526252725282529253025312532
242243244
245
![Page 71: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/71.jpg)
CD ISO/IEC 15944-12:2014(E)
It is vital that Persons do not collect or retain any personal information which may harm an individual. This applies especially where such personal information is not accurate, timely, relevant which would be associated with the individual.
5.4.2 Privacy protection principle 2: Accountability 32
Rule 003:An organization should ensure that its privacy protection officer (PPO) has direct liaison with the officer(s) in that organization responsible for ILCM related aspects for any and all SRIs maintained by the organization.
It is up to each organization to decide how to assign responsibility for ILCM, i.e., among records managers, archiving, information managers, IT managers, security managers, etc. However, in order to ensure that legal and regulatory requirements applicable to personal information in an IT system of that organization are implemented, it is vital that the PPO of that organization is given the mandate on an organization-wide basis, to be able to ensure that there is a very clear and transparent organization policy and process able to ensure and support full compliance with applicable ILCM aspects of privacy protection requirements.
NOTE: A privacy protection officer (PPO) is a role of an officer in an organization. It may well be that the same organization Person is assigned responsibility for more than one role within an organization including those pertaining to corporate information law compliance, responsibility for corporate internal constraints such as information/records management, security, etc.
Rule 004:Where an organization interchanges personal information (e.g., through EDI) with one or more other organizations, i.e., as via its agent(s), and/or third pparty(ies) (e.g., , its privacy protection officer (PPO) shall ensure that the other organization in their operations and IT Systems support privacy protection requirements.
Guideline 004G1:It is recommended from a legal, risk management, and “business best practices” perspective, that an organization request its Privacy Protection Officer(PPO), to review any (prospective) EDI of the (seller) organization of any SPIs pertaining to a (prospective)business transaction with any (potential) agent and/or third party, to ensure that any such Open-edi parties have in place in their IT systems the ability to support applicable privacy protection requirements, and are willing to sign a contractual arrangement in support of the same (e.g., of the nature of the Clause 10 Coformance Statement provided below in this Part 12).
The organization acting in the role of “seller” (or “regulator) has an obligation to ensure that privacy protection requirements are applied to personal information. This applies, especially where the organization interchanges such personal information with another organization (as per informed consent of the individual for that business transaction).
5.4.3 Privacy protection principle 3: Identifying purposes 33
Each business transaction pertains to a specific and specified goal which the parties to the transaction have committed themselves.
Rule 005:In specifying the purpose, the organization collecting or creating the personal information shall also identify and specify applicable ILCM aspects and inform the individual accordingly.
It is very important that in a business transaction (or any form of commitment exchange) that where the buyer is an individual, that the individual is fully informed on any and all ILCM aspects related to the personal information created or collected as part of that business transaction.
32 This Clause and its rules complement those of Part 8, Clause 5.3.2 which apply here.
33 This Clause and its rules complement those of Part 8, Clause 5.3.3 which apply here.
© ISO 2014 – All rights reserved 71
247
253325342535
2536
2537
25382539254025412542254325442545254625472548
2549255025512552
2553255425552556255725582559256025612562256325642565256625672568256925702571
2572
25732574
2575257625772578257925802581
248
249
![Page 72: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/72.jpg)
CD ISO/IEC 15944-12:2014(E)
For example, the personal information pertaining to the business transaction will be kept for two years after the transaction is completed after which it will be expunged.
The records retention period depends on the type of transaction and the applicable laws in the jurisdictional domain, e.g., all finance records are kept for 6/7 years. There is thus a link to the organization’s records retention schedule which in term supports applicable laws/regulations in the jurisdictional domain. The personal information may have to be retained as well, i.e., the purpose for which it was collected is still valid, i.e., it has to meet legislation. Now if the finance/tax laws do not require the personal information, then there is another task, i.e., delete all personal information but keep the rest of the record for tax purposes. Logistics to be dealt with in rules/guidelines. Must be linked to RRDS.
Rule 006:As part of the identifying purpose, the seller shall state to the potential buyer, when an individual, whether personal information collected on or received from that individual will be expunged or retained for a specified time period, should be intended business transaction not be actualized.
Rule 007:As part of identifying purpose, the organization collecting or creating the personal information in the context of the particular transaction shall state whether or not such personal information will be shared, (e.g., via EDI) with other organizations, and if so, only with those organizations which in their operations support privacy protection requirements.
5.4.4 Privacy protection principle 4: Informed consent 34
The principle of “informed consent” requires that the individual, as prospective buyer, be fully and explicitly informed by the seller as to why and for what purpose, the individual is requested (or required) to provide (additional) personal information (of various kinds), i.e., in addition to that which may be required with respect to payment aspects. This principle is clearly a requirement to flag personal information supplied as being for limited use.
Rule 008:The principle of informed consent applies to any and all ILCM aspects of the personal information created or collected as may be required.
Guideline 08G1:Organizations should have and make available to prospective buyers, i.e., as individuals, the organization’s ILCM policy as it applies to the personal information forming part of the business transaction.
5.4.5 Privacy Protection Principle 5: Limiting Collection35
Rule 009:Where the organization needs to share personal information pertaining to a specified business transaction, (e.g., via EDI), such personal information shared shall also be limited to that which is absolutely necessary and relevant.
Most often the EDI aspects pertain to a limited sub-set of the personal information pertaining to a business transaction.
34 This Clause and its rules complement those of Part 8, Clause 5.3.4 which apply here.
35 This Clause and its rules complement those of Part 8, Clause 5.3.5 which apply here.
72 © ISO 2014 – All rights reserved
251
25822583
2584258525862587258825892590
25912592259325942595259625972598259926002601
2602
26032604260526062607
260826092610261126122613261426152616
2617
26182619262026212622
26232624
252
253
![Page 73: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/73.jpg)
CD ISO/IEC 15944-12:2014(E)
5.4.6 Privacy Protection Principle 6: Limiting Use, Disclosure and Retention36
This Privacy Protection Principle consolidates and integrates what are considered “generic, primitive” Information Life Cycle Management (ILCM) principles. As such, Clause 6 below titled “Integrated set of information life cycle management principles in support of information law compliance” applies to these privacy protection principles.37
Rule 010:The integrated set of ILCM principles applies to and supports the external constraints of a privacy protection nature for any business transaction involving an individual and its personal information.
From an ILCM perspective, this principle is particularly relevant and important especially the requirement on an organization to limit the retention of personal information pertaining to a business transaction.
Rule 011:Unless expressly required to be retained due to external constraints of applicable jurisdictional domains, or directly linked to the purpose and nature of the business transaction all personal information collected, created or received pertaining to the planning, initialization and/or negotiation of a business transaction shall be expunged where the business transaction is not actualized.
Rule 012:The seller in a business transaction shall ensure that any and all use within an organization shall be limited to the purpose of the business transaction.
Guideline 012G1:It is advised that personal information pertaining to (the same type of) business transaction, be managed within a specified DMA(s) s to facilitate implementation of required functional support services.
Rule 013:Personal information shall be retained by the seller only for as long as is necessary for the fulfillment of those purposes as specified as part of the business transaction.
Note that this rule may require that some personal data must be retained specifically for this purpose and that therefore this purpose is implicitly necessary to a transaction involving personal data.
Personal information must be identified as having a specific ‘life’ of time of existence if this is to be other than that demanded for the purposes of national record keeping. This retention time period shall form part of the scenario definition and the time period will be explicit.
Rule 014:Organizations shall have in place auditable rules and procedures as are necessary to ensure that personal information no longer required for the post-actualization phase of a business transaction shall be destroyed (expunged) by the organization, or its agents where applicable, and in a manner which can be verified via audit procedures.
Guideline 014G1:
36 This Clause and its rules complement those of Part 8, Clause 5.3.6 which apply here.
37 The focus and scope of ISO/IEC JTC1/SC32 standards development work is “Data Management and Interchange” was at first not only within the IT system(s) of a Person of primarily organizations (including public administrations) but now also includes individuals (and their IT systems). As such, Open-edi standards development, which focuses on the collaboration space among Persons and their IT systems, has from it inception supported information life cycle management (ILCM) requirements. The need to reflect and support ILCM requirements is of particular importance where external constraints apply to the modelling of a business transaction. This was reflected and explicitly supported in the development of the existing principles, rules and definitions in ISO/IEC 15944, i.e., its definitions of relevant concept, and rules and include those found in the “Characteristics of Open-edi”, those pertaining to state changes, record retention, the specification of the collaboration space, etc., as well as being found in the templates for scoping Open-edi transactions and modelling Open-edi scenarios and their components.Annex D below brings forward and states explicitly the ILCM principles in support of information law compliance, i.e. external constraints, applicable to the modelling of common business transactions via Open-edi scenarios.
© ISO 2014 – All rights reserved 73
255
2625
2626262726282629
263026312632263326342635
263626372638263926402641264226432644264526462647264826492650265126522653265426552656
265726582659
2660266126622663266426652666
256
257258259260261262263264265266267268
![Page 74: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/74.jpg)
CD ISO/IEC 15944-12:2014(E)
For most, if not all, instantiated business transactions, external constraints of the applicable jurisdictional domain(s) require that specific sets of recorded information (SRIs) pertaining to any business transaction be retained by the seller for a specified period of time.
It is recognized that, depending on the nature of the good, service and/or right which is the goal of the business transaction, specified additional records retentions requirements of applicable jurisdictional domains may apply to all or specified subsets of all the recorded information pertaining to a business transaction.
It is also recognized that where the purchase of a good, service and/or right involves “post-actualization” aspects of a temporal nature that these will also impact record retention requirements and obligations resulting from an actualized business transaction. A primary example here of an internal constraint nature is that of a “warranty” for “n” number of years38. This includes the possibility that the individual who made the purchase may not be the “warranty holder”39.
The following rules summarize these requirements from a BOV perspective:
Rule 015:The seller shall identify to the buyer, especially where the buyer is an individual, any and all record retention requirements pertaining the resulting sets of recorded information forming part of the specified goal of a business transaction as a result of applicable external constraints of jurisdictional domain(s) as a result of the actualization of the business transaction.
Rule 016:Where the seller offers a warranty, or extended warranty, as part of the business transaction, the seller shall inform the buyer, when the buyer is an individual, of the associated added records retention requirements for the personal information associated with the warranty (including the purchase by the individual of an extended warranty).
The sale of many types of goods or services, require the seller to inform the buyer of possible safety and health considerations with respect to whatever was purchased. These include product recalls, repairs, verifications checks or testing of specific function or components, etc.
Rule 017:Where the buyer in a business transaction is an individual, the seller shall inform the individual of any and all records retention requirements of personal information which is recorded as the result of the actualization of the business transaction, including:
1) personal information which is required to actualize the business transaction and the time period(s) for which such sets of personal information are to be retained;
2) additional personal information, i.e., in addition to (1), which is required to be collected and retained as a result of applicable external constraints, of whatever nature, of relevant jurisdictional domain(s); and/or,
3) additional personal information, i.e. in addition to (1) or (2), which is required to be collected and retained as a results of the invocation of an associated warranty, purchase of an extended warranty, or any other personal information which is required to be collected or retained as part of the post-actualization phase of an instantiated business transaction.
From a customer service, many sellers, i.e. organizations (including public administrations), wish to stay in contact with their customers for a variety of reasons. These include providing catalogues of their offerings,
38 Here it is noted that in order to be able to support a “warranty” of whatever nature, the seller will need to maintain personal information for a time period other, i.e. longer, than that required by law, i.e. as part of the applicable external constraints of the relevant jurisdictional domain(s). This is especially so where consumers purchase an “extended warranty”.
39 For example, where the good or service purchased as a gift. Here the recipient of the gift, as an individual, would become the owner and also would complete the warranty information including personal information required for the warranty to be invoked.
74 © ISO 2014 – All rights reserved
270
2667266826692670267126722673
26742675267626772678
2679
268026812682268326842685268626872688268926902691269226932694
2695269626972698269927002701
270227032704
2705270627072708
27092710
271272273274
275276277
![Page 75: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/75.jpg)
CD ISO/IEC 15944-12:2014(E)
possible associated goods or services, etc., as well as obtaining client feedback, surveys, new product announcements, etc.
Rule 018:Where the buyer in business transaction is an individual, the seller shall inform that individual of the applicable record retention conditions where these pertain to personal information.
It is important that when the buyer is an individual that, prior to and at the actualization phase in a business transaction, that the individual is fully informed by the seller of its records retention requirements and practices of the seller particularly as these pertain to the personal information forming part of the set(s) of recorded information. Here it may well occur, depending on the nature of the business transaction, that certain types of personal information may be subject to differing records retention periods.
It is noted that where the business transaction is one of the nature of the provision of a service or a right, (such as a license or authority of some kind) that the seller needs to retains a specified set(s) of personal information for as long as a business transaction of this nature remains active.
Rule 019:Where a business transaction does not reach the actualization phase, any personal information collected by the organization in support of that transaction shall be deleted by the organization (unless the individual concerned explicitly consents to the prospective seller to the retention of such personal information for a defined period of time).
An individual may have provided personal information to a seller as part of the identification or negotiation phase. However, in this case the individual decides not to commit to the actualization of the business transaction. As such the personal information provided by the individual to the seller is no longer relevant, and therefore the organization concerned shall delete the personal information pertaining to that individual.
It is noted that this rule makes provision for the possibility that the individual, as a prospective buyer, may consent to be kept informed by the seller about product information (e.g. via a catalogue), special sales, new offerings, etc. Such a decision by the individual is of the nature of obtaining “informed consent”.
Particular care must be taken to avoid collecting or providing data that are not actually necessary for the purpose(s) of the transaction itself. By way of example, in the transaction given in section 6 of a purchase and payment it may not be necessary for the seller to know the actual personal identity of the buyer, but to have an identifier by which that buyer may be uniquely identified to the seller. It may be sufficient that the seller is certain of payment because the seller has an authority from a third party such as a bank that the transaction will be paid. Thus the bank may need to know the identity of the buyer and seller in order to fulfill its requirements in the transaction (but not the content of the transaction), whilst the seller does not need to know the identity of the buyer. The same is true when agents are used, or when a public administration is a supervisor to a transaction, where the other parties need to know and perhaps be able to prove that the public administration was involved, but not be able to identify the individual within the public administration actually involved (although the internal functions of the public administration may need that information for their own supervisory purposes).
5.4.7 Privacy Protection Principle 7: Accuracy40
It is to the mutual benefit of all parties to a business transaction, and also a good business practice, to ensure that any and all recorded information pertaining to a business transaction be as timely, accurate, complete, up-to-date, etc., as possible. Accuracy of recorded information is an essential component of “integrity41” which is a major asset of any organization. Organization should not keep recorded information on its business transaction or its clients which is not accurate or out-of-date, especially in the DMAs of its IT systems.
40 This Clause and its rules complement those of Part 8, Clause 5.3.7 which apply here.
41 It is noted that an organization which does not have policies and auditable procedures in place, as part of its overall governance, to ensure that the recorded information on which its decisions and commitments are made, does not have the required level of “integrity” (e.g. timeliness, accuracy, being-up-to data, etc.) and ensures that all its recorded information which does not meet these criteria is expunged (unless required to be retained due to applicable external constraints), may find itself (and particular its officers) being subject to legal action for not exercising stewardship, due diligence, damages, etc., for not implementing these requirements (which in turn form part of the implementation of ILCM principles).
© ISO 2014 – All rights reserved 75
279
27112712
271327142715
27162717271827192720
272127222723
27242725272627272728
2729273027312732
273327342735
273627372738273927402741274227432744274527462747
2748
27492750275127522753
280
281282283284285286
![Page 76: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/76.jpg)
CD ISO/IEC 15944-12:2014(E)
Organizations concluding business transactions with buyers, as individuals, should have no difficulties in support the external constraint of “accuracy” of a privacy protection nature (including in the DMAs of their IT systems).
The “Accuracy” principle is closely related to ensuring the “integrity” of the SRIs in an ILCM context, i.e., the trustworthiness of personal information throughout its life cycle.
Rule 020:Personal information shall be as accurate, complete and up-to-date as is necessary for the specified purposes for which it was collected in support of the business transaction.
Here, the scenario definition shall make it clear that the data identified shall subsequently be capable of amendment (including deletion). It may be that there are other data for which alteration may be forbidden, either by automatic or manually inspired processes.
One should consider the implementation of this principle to be of the nature of good corporate governance and best practices. For a variety of reasons, organization should not retain personal information, or retain the same in its IT systems, if such personal information is not accurate, complete and up-to-date.
Guideline 020G1:In order to support the privacy principle of accuracy, organizations should consider informing their clients, who are individuals, of the personal information retained on that individual, and do so on a cyclical basis in order to ascertain whether such personal information, collected earlier and still maintained by the organization, is still accurate.
5.4.8 Privacy Protection Principle 8: Safeguards42
Rule 021:Personal information shall be protected by operational procedures and safeguards appropriate to the level of sensitivity of such recorded information and shall have in place (and tested) measures in support of compliance of compliance with privacy protection requirements of applicable jurisdictional domains, as well as any other external constraints which may apply such measures as are appropriate to ensure that all applicable legal requirements are supported.
Rule 022:To support the “safeguard” principle, in an ILCM requirements context, an organization shall ensure that no personal information is destroyed, altered, falsified, rendered meaningless or useless, etc., thereby ensuring the continued integrity and authenticity of any and all SRIs, IBs, and SCs pertaining to a business transaction.
Guideline 022G1:Where an organization does not have a single designated focal point and “officer, i.e., a “privacy protection officer (PPO)” responsible for ensuring the identification and implementation of safeguard requirements applicable to all of its recorded information, it should ensure that all of its personal information meets privacy protection requirements.
This principle also introduces the concept of protection. Protection involves one or more constraints that are to be applied to specific data that are expected to provide the safeguard that is appropriate. It should be noted that the actual sensitivity of the data to be protected may be of national or cultural expectation, and need not be consistent. It should also be noted that in modelling, specific data fields are labelled with the type of privacy protection that is to be provided, but that it is for the FSV implementation to determine how such privacy protection requirements are given technical effect. In this part of ISO/IEC 15944 only the means of determining the agreed (or required) privacy protection that is attaching to specified SRIs, (e.g., data elements fields, records, etc.), is addressed.
42 This Clause and its rules complement those of Part 8, Clause 5.3.8 which apply here.
76 © ISO 2014 – All rights reserved
288
275427552756
27572758
275927602761
276227632764
276527662767
27682769277027712772
2773
277427752776277727782779
27802781278227832784
27852786278727882789279027912792279327942795279627972798
289
![Page 77: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/77.jpg)
CD ISO/IEC 15944-12:2014(E)
5.4.9 Privacy Protection Principle 9: Openness43
The principle of “openness” pertains to the privacy protection requirement that any organization which collect and uses personal information shall be fully transparent in its use of personal information. This means that all of its policies and business practices pertaining to the collection, use and management of any personal information shall be made readily and publicly available, free of charge, and via various means and media of communication. This also applies to those of an ILCM nature.
Rule 023:An organization shall have and make available to any individual, as a buyer in a business transaction, specific information about its policies and practices of an ILCM nature including state changes, retention periods, disposal, etc., including of how these are enforced with respect to the use of agents and/or third parties to the business transaction.
Guideline 023G1:It is recommended that the organization make available such ILCM information at the planning phase, or if not, during the identification phase and no later than the negotiation phase of the business transaction.
5.4.10 Principle Protection Principle 10: Individual Access44
A key component of privacy protection requirements is that an individual shall be able to enquire of any organization (private or public sector) whether or not that organization has and maintain personal information about that individual anywhere in its record/information management systems. From a business transaction and Open-edi perspective, this principle applies in particular to the DMAs in the IT systems of an organization.
It is anticipated that this principle will be enacted not through this part of ISO/IEC 15944 but through laws and regulations of the applicable jurisdictional domain(s) pertaining to the business transaction where the individual is the buyer.
Rule 024:An individual, in the role of a buyer, in a business transaction with an organization, shall be able to request and receive from the organization information of the existence, current state, use and disclosure of his or her personal in formation pertaining to that business transaction and especially any and all ILCM aspects.
5.4.11 Privacy Protection Principle 11: Challenging Compliance45
Challenging compliance is a key privacy protection principle. It pertains to the right of an individual to question and thus challenge whether or not: (1) an organization has under its control (or maintains on behalf of other organizations) personal information on the individual; and, (2) if it does, that such personal information is accurate, timely, and relevant to the nature of the informed consent provided by that individual.
Depending on the privacy protection requirements of the applicable jurisdictional domain, an individual may have the right to:
(a) challenge compliance directly with the organization to whom the challenge is directed;
(b) direct such a challenge, (e.g., complaint) to a privacy or data protection commissioner/ombudsman as provide for in the jurisdictional domain; or,
(c) various combinations of (a) or (b) above”.
It is anticipated that this principle will be enacted not through this part of ISO/IEC 15944 but through laws and regulations of the applicable jurisdictional domain(s) pertaining to the business transaction where the individual is the buyer.
43 This Clause and its rules complement those of Part 8, Clause 5.3.9 which apply here.
44 This Clause and its rules complement those of Part 8, Clause 5.3.10 which apply here.
45 This Clause and its rules complement those of Part 8, Clause 5.3.11 which apply here.
© ISO 2014 – All rights reserved 77
292
2799
28002801280228032804
28052806280728082809
2810281128122813
2814
2815281628172818
281928202821
28222823282428252826
2827
2828282928302831
28322833
2834
28352836
2837
283828392840
293
294
295
![Page 78: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/78.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule 025:An individual shall be able to challenge the timeliness and accuracy of his or her personal information including ILCM aspects such as state changes, retention, and expungement with respect to a business transaction.
5.5 Requirement for tagging (or labelling) data elements in support of privacy protection requirements46
The application of the general privacy protection principles, as stated in Part 8, Clause 5.3, requires an organization to be able to identify and tag any and all personal information when it is created or collected in its IT systems. Such tagging is required enable an organization’s compliance with specific privacy protection requirements, (e.g., via metadata or properties/actions assigned to cells in a database). An organization can do such tagging of sets of recorded information at the records level (e.g. client file level) down to the more granular data element level.
Rule 026:An organization shall have in place policies and procedures in order to identify and tag (or label) all sets of recorded information (SRIs) which contain personal information, i.e., where the buyer to a business transaction is an individual and do so at the appropriate level of granularity to facilitate compliance with both generic and specific privacy protection requirements.
Rule 027:Where necessary to comply with ILCM requirements, the organization shall add tags to SRIs required to support the execution and management of state changes, retention periods, disposition, etc.
46 The requirements and rules stated in Part 8, Clause 5.4 apply here.
78 © ISO 2014 – All rights reserved
297
2841284228432844
28462847
284828492850285128522853
28542855285628572858
285928602861
2862
2863
2864
2865
298
![Page 79: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/79.jpg)
CD ISO/IEC 15944-12:2014(E)
6 Integrated set of information life cycle management (ILCM) principles in support of information law and privacy protection requirements47
Project Co-Editors’ Notes:
1. The text found below is based on existing Annex D (normative) in Part 8 as amended in a Part 12 context. Further development of Clause 6 is a key element in the development of Part 12.
2. JTC1/SC32 P-members are requested to review Clause 6 carefully to determine whether any new ILCM principles should be added, existing ones amended (or consolidated), etc., i.e., via their ballot comments.
6.1 Introduction – Primary purpose of Clause 6
The primary purpose of Clause 6 in this 1st edition of Part 12 is to bring forward a high level set of generic information life cycle management (ILCM) principles which integrate and consolidate the essential elements of any law, regulation, etc., which have an information law component(s). These ILCM principles and their implementation are essential in order to ensure that any organization (or public administration) complies with ILCM related requirements which are embedded in their compliance with privacy protection requirements of applicable jurisdictional domains. These principles are generic in nature. On the whole they apply to both internal constraints and external constraints. These ILCM principles therefore also provide an overall context for the privacy protection principles presented in Clause 5.3 above and which in particular, those which are required to be implemented in order to support privacy protection requirements of applicable domains.
Further, there are also legal requirements which pertain to any set of recorded information interchanged among parties to a business transaction. These include record retention requirements, those of an evidentiary nature, archiving, contingency/disaster planning, etc., a.k.a., “information law” requirements, governing information management and data interchange of an organization.
The procedures, documentation and related activities pertaining to business transactions and resulting sets of recorded information (SRIs) (consisting of one or more IBs or SCs) used in EDI require that the highest standards of integrity and trustworthiness are maintained. A primary factor here is that business transactions represent the most common form of making and executing commitments among the parties concerned.
These pertain not only to the flows of information and the contents of the recorded information but also there exists many other laws, regulations, etc., impacting information management and interchange including supporting documentation. Examples of such laws impacting business transactions include those pertaining to records keeping, access and use, disposition, archiving, etc. These are stated in the form of laws, pursuant regulations, statutory instruments, policies, codes, etc.
From a high level perspective, and taking into account specific information law requirements of jurisdictional domains (as well as those pertaining to, privacy protection requirements one can group these ILCM requirements into a number of discrete categories.
Discrete categories of "information law" already identified with respect to personal information include those that:
require one to keep or retain certain personal information;
require one to track, note, any state changes to personal information;
require one to have the ability to produce or retrieve certain types of personal information48;
require one to submit or file personal information to a government or regulatory agency;
47 The text and rules found in normative Annex D, Part 8 apply to this Clause 6 in Part 12. The text and rules in this Clause 6 focus on ILCM aspects.
48 See further below Clause 7.4 “Rules governing specification of state changes of personal information”.
© ISO 2014 – All rights reserved 79
300
28662867
2868
28692870
287128722873
2874
287528762877287828792880288128822883
2884288528862887
2888288928902891
28922893289428952896
289728982899
29002901
2902
2903
2904
2905
301302
303
![Page 80: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/80.jpg)
CD ISO/IEC 15944-12:2014(E)
require one to create and/or make available personal information if one undertakes a particular activity, i.e., pertaining to a product, service and/or right;
require one retain personal information “indefinitely” or for a specified period of time;
require one to destroy personal information;
place conditions on the manner in which one handles personal information;
place conditions on the reproduction, distribution or sale of personal information; and,
place conditions on the sharing, linking or flows of personal information (within or among jurisdictions).
With respect to these categories:
(1) one or more of these categories of information law can apply to a "set of recorded information (SRI); and,
(2) an "information law" can include more than one category of requirements.
Two basic approaches are possible. The first, which is the current, traditional approach, is that of addressing each information law requirement on its own, i.e., as a "vertical silo". Here different operational areas within an organization comply with information law requirements on their own, integrate them into their applications, and deal with issues as they are identified, a crisis occurs, an audit discovers gaps, lack of compliance results in court actions, liability suits, etc. Convergence in and information communication technologies (ICT), increased the need for trustworthiness and integrity, accountability, etc., has made this "traditional" approach increasingly less viable.
It is vital that such an integrated approach to information life cycle management of the recorded information of an organization be senior management approved and driven. It is also very important that such ILCM principles focus on the WHATs not the HOWs and be stated in simple, non-technical language
6.2 Information life cycle management (ILCM) principles in support of privacy protection requirements
6.2.1 Compliance with privacy protection (and associated information law) requirements
Rule 028:Where external constraints (of a relevant jurisdictional domain(s)), with respect to privacy protection requirements to a business transaction, the Person as a seller shall ensure that such privacy protection requirements are identified and supported.
The Annex B.7 below provides a consolidated list of rules found in ISO/IEC 15944-8 which identify external constraints of relevance to supporting privacy protection requirements. Further, Clause 7 in Part 8 identifies a number of other public policy requirements of jurisdictional domains which apply where and when the Person in the role of a buyer in a business transaction is an “individual”. These include “consumer protection”, and “individual accessibility”.
These and related information law based requirements are often quite similar in nature. It therefore benefits an organization to take an integrated approach to supporting and complying with information law requirements.
Guideline 028Gn:An organization (for-profit or not-for-profit basis) (or public administration) should have: (a) an accurate and up-to-date list of all information law requirements which apply to the organization, i.e., both of a generic horizontal nature and those specific to the mix of goods and/or services it provides; and, (b) must be in full compliance with such information law requirements.
80 © ISO 2014 – All rights reserved
305
29062907
2908
2909
2910
2911
2912
2913
2914
2915
2916291729182919292029212922
292329242925
2926
29272928
2929
2930293129322933293429352936293729382939
294029412942
29432944294529462947
![Page 81: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/81.jpg)
CD ISO/IEC 15944-12:2014(E)
6.2.2 Direct Relevance
Rule 029:Any personal information which exists at an organization pertaining to a (potential) buyer in a business transaction shall be directly relatable to and relevant to the (Agreed upon) goal of the business transaction.
Privacy protection requirements include the need that one collect or create only personal information which is directly related to the goal of the business transaction may be retained.
6.2.3 Timely, accurate, relevant and “under control”
Rule 030:All personal information pertaining to a business transaction shall be timely, accurate and relevant, and under “control” of the seller, i.e., it must be identifiable, retrievable and accountabilities must be assigned.
Rule 031:The organization which is the primary party to a business transaction, i.e., the seller, shall maintain “control” of all personal information pertaining to a business transaction, including where such personal information is shared with an agent or third party, (e.g., via EDI). {See further Clause 7.2 below}
6.2.4 Integrity and quality
Rule 032:Information management policies and practices, as well as those of supporting information handling systems for personal information must ensure that the level of trustworthiness, (data) integrity, quality and dependability for such personal information is consistent with and supports the organization’s objectives and information law requirements.
6.2.5 Safeguards for non-authorized disclosure requirements
Rule 033:Where required (or warranted), personal information should be protected from premature and/or non-authorized disclosure. Adequate safeguards must be enacted to ensure the required levels of privacy protection within the seller organization (and its EDI parties).
It is important to note that the corollary of this ILCM principle, i.e., mandated disclosure, is supported equally. That is, recorded information, to which the public in general and/or specified Persons have a right of access to, must not be withheld from disclosure.
6.2.6 Back-up, retention and archiving
Rule 034:Recorded information which has long-term value and/or forms part of the corporate memory should be identified and conserved. This includes recorded information required for contingency planning, back-up, emergency response and related requirements.
Rule 035:Where the buyer is an individual, personal information shall be considered confidential among the parties to the business transaction and not disclosed to any other party unless: (a) so permitted or authorized under applicable privacy protection legislation and regulation; or, (b) with the explicit and informed consent of the individual whose personal information it is.
Rule 036:
© ISO 2014 – All rights reserved 81
307
29482949
2950295129522953
29542955
2956
2957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987
29882989299029912992299329942995299629972998
2999
![Page 82: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/82.jpg)
CD ISO/IEC 15944-12:2014(E)
Organizations shall ensure adequate back-up and contingency planning for personal information pertaining to a business transaction.
Rule 037:Organizations shall retain personal information at the required level of detail as required by applicable information law and/or post actualization requirements, (e.g., in relation to a warranty).
6.2.7 Disposition and expungement
Rule 038:Any personal information which is no longer relevant to an organization’s operations and which does not meet the above criteria should be disposed of immediately. This includes any personal information whose ILCM properties from part of the business transaction.
Project Co-Editors’ Notes:
1. Add text and rules as required based on CD ballot comments
2. ? Do we need a short one page informative Annex on further clarification, examples, of “expungement”? P-members are invited to make CD ballot comments on this matter. The PEs are willing to prepare such a short informative document as a new Annex to Part 12.
3. Basically such a new informative Annex would expand on the definition of Clause 3.152 SRI expungement.
6.2.8 Organizational archiving
Rule 039:Where a business transaction involves personal information, the Open-edi records retention and disposal schedule (Oe-RRDS) period shall be established by the (seller) organization prior to the actualization of the business transaction.
Guideline 039G1:It is advised that with respect to any good, service and/or right which is the goal of business transactions offered that the seller (organization) has prepared and has available the information and the associated Oe-RRDS to prospective individuals as buyers.
Organizations (and public administrations) can group or categorize their Oe-RRDSs, generally or by categories of their (offered) business transactions). For cost-effective and efficient conduct of their business activities, organizations also have in place Oe-RRDs which are cost-effective, efficient and implemented in a very systematic manner.
6.2.9 Historical, statistical and/or research value
Project Co-Editors’ Notes:
1. Ballot comments here from P-members are most welcome.
2. Personal information provided by individuals to public administrations in support of business transactions by the individual with a Person in the role of a “public administration” is often shared with and used by other public administrations within the same (level) of jurisdictional domain. A commonly used label here is “administrative data”.
3. From privacy protection requirements perspective and in an Open-edi context there are several sub-types of SPIs as administrative data , namely,
82 © ISO 2014 – All rights reserved
309
3000300130023003300430053006
3007
30083009301030113012
3013
3014
301530163017
30183019
3020
3021
30223023302430253026302730283029303030313032303330343035
3037
30383039304030413042304330443045304630473048
![Page 83: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/83.jpg)
CD ISO/IEC 15944-12:2014(E)
3.1 Those which an individual is required to provide when so requested to a public administration (e.g., under a “(national) Statistics Act”, “income Tax Act”, etc., and where the access and use of such SPIs is (severely) restricted and controlled under applicable legislation (and associated regulations), i.e., any identified information law of a jurisdictional domain which “compel” an individual to provide one or more pre-defined SPIs to a public administration. Where this is the case, it is assumed that the
3.1.1 the relevant/applicable specified information law is harmonized with and supports the privacy protection requirements within that jurisdictional domain;; and,
3.1.2 that any information law requirements of a jurisdictional domain which impact privacy protection requirements of that jurisdictional domain and in turn harmonized with those of other jurisdictional domains, when and where such SPIs are shared with other jurisdictional domains, the privacy protection requirements of the jurisdictional domain of the individual rule and take precedence.49
3.2 Those which an individual decides to provide on his/her own volition in order to obtain a good, service and/or right.
4. In these cases, and others, there exist laws, regulations, policies and procedures, which govern, i.e., provide a legal basis to “take’, i.e., copy, SPIs collected, managed and used for a specific goal of a business transaction by a public administration (and also by private organization), is required to be interchanged by the seller organization to (another) public administration. On the whole data of this nature is known as “administrative data”. From an ILCM needs perspective, “administrative data”, copied, via EDI to another organization, and in particular where such EDI is either required or sanctioned by law, the originating organization loses “control” of data of this nature to the receiving organization.
5. Here it is assumed that once such an EDI takes place that there are no more “state changes” to the SRIs transferred as IBs. This is the “default” rule. At the same time, there are occasions (or applications”) which required continues data flows of SRIs pertaining to a business transaction to another organization (as legal entity) for “administrative data” purposes. Where such SRIs are or include SPIs, privacy protection requirement’s apply and must be supported.
6. The development of an ISO standard based solution to the issues identified above requires additional work and resources, as well at a level of detail which is more than that of this 1 st edition of this Part 12. Therefore consideration should be given to addressing issues of this nature via a new ISO/IEC 15944 project as a “Technical Report” to be incorporated into the 2nd edition of this Part 12, a new Part of ISO/IEC 15944, or remain as a TR ( to be referenced document for new editions of existing Parts of ISO/IEC 15944.
7. JTC1/SC32 P-members are requested to provide input on the best ways to address these and related issues via their CD ballot comments.
It is a common practice, as well as one sanctioned and supported through relevant applicable information law that personal information collected or provided as SPIs for a specific purpose in support of particular decision taking and commitment-making pertaining to the individual, i.e., in any type of business transaction, is and can be used for other purposes where so permitted or sanctioned based on applicable information law. (and pursuant regulations and related legal instruments). This is especially so with respect to SPIs provided to or collected by public administrations use in a business transaction.
Rule 040:Personal information which has historical value should be identified and conserved (as part of the organization’s and/or electronic cultural heritage/” (“patrimoine informatisée”).
49 This requirement links to consumer protection requirements which state that the legal and regulatory requirements of the jurisdictional domain on the “consumer” govern the rights of the consumer, independent of any other jurisdiction al domains of the parties involved to the particular business transaction.
© ISO 2014 – All rights reserved 83
311
3049
305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082
3083308430853086308730883089
3090309130923093309430953096309730983099310031013102
312313314
![Page 84: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/84.jpg)
CD ISO/IEC 15944-12:2014(E)
It is not uncommon that personal information resulting from a business transaction may have historical or research value. This is especially so in public organizations and governments. For example, many jurisdictional domains have archiving legislation which allows their archives to retain non-active personal information. The same situation is common in medical institutions.
Rule 041:Applicable archival or research oriented legislation or regulation may exempt specified personal information from being expunged.
It is noted that research oriented legislation, as well as (international) research protocols usually require that personal information to be used with respect to (longitudinal) research projects be anonymized. In addition, personal information which is retained for archival purposes can become publicly available after the death of the individual, after 100 years, or according to legislative or regulatory constraints which are similar in nature.
Rule 042:An individual may request or agree to, as part of his explicit and informed consent in entering into a business transaction, to allow the party in the role of seller to retain specified personal information after normal or statutory retention period has expired.
Rule 043:Where the buyer in a business transaction is an individual the seller shall provide detailed information on the seller’s retention and disposal schedule for personal information created or collected during any of the five phases of the business transaction.
Apart from the fact that privacy protection requirements apply to the seller with respect to retention and disposal of any and all personal information pertaining to the prospective individual buyer, depending on the nature of the business transaction, various legal, regulatory, statutory, etc., records retention and disposal authorities apply. For example, the financial aspects of a business transaction may be required to be retained for a minimum of seven (7) years following the completion of a business transaction. Also, certain types of personal information may be required to be retained “forever”. Many of these involve information law requirements of a generic nature and are usually maintained by public administrations or their agents, (e.g., notaries, lawyers, etc.). Examples include titles of property, (sale records), marriage (and divorce) records, etc.
84 © ISO 2014 – All rights reserved
316
31033104310531063107
3108310931103111311231133114311531163117311831193120312131223123312431253126
312731283129313031313132313331343135
![Page 85: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/85.jpg)
CD ISO/IEC 15944-12:2014(E)
7 Rules governing the specification of ILCM aspects of personal information
7.1 Introduction
Generic aspects of external constraints of jurisdictional domains as rules and definitions governing business transactions are found in ISO/IEC 15944-5.
Note: Users of this document are advised to familiarize themselves with the rules, definitions and associated text of Clause 6.6.4 “Data component”, as found in ISO/IEC 15944-5 (a “freely available standard”).
Within a data management and interchange context, it is important that parties to a business transaction control the states of their IT systems. This is a fundamental characteristic of Open-edi. Under internal constraints it is a best practice of organizations and public administrations to maintain control of the sets of recorded information (SRIs) in their IT systems (as especially those in their DMAs). This includes both state changes as well as records retention and scheduling requirements. This pertains to basic information life cycle management (ILCM) principles in support of information law compliance. {See further above Clause 5)}
The need for information law compliance is even more so and mandatory when the set(s) of recorded information pertain to a business transaction, i.e., a “commitment exchange”, where the buyer is an individual.
These generic Open-edi aspects and rules pertaining to a business transaction are mandatory in any business transaction context which involves an individual as a buyer. This is because, where this is the case, privacy protection requirements apply.
The generic aspects of external constraints of jurisdictional domains of a privacy protection nature as rules and definitions governing business transactions are found in ISO/IEC 15944-8.
The purpose of this Clause 7 is to bring forward in an integrated manner in an Open-edi context applicable concepts and their definitions as well rules and related normative text found in Part 5 and Part 8 in the particular context of this Part 12 of ISO/IEC 15944 which focuses on privacy protection of an ILCM nature requirements; namely:
1) those pertaining to state changes in the sets of recorded information (at whatever level of granularity); and;
2) those pertaining to records retention requirements, including assured disposition of personal information.
As such, the purpose of Clause 7 is to bring forward normative text, rules and associated coded domains from ISO/IEC 15944-5, Clause 6.6.4.2 and 6.6.4.3 and present them in an amended form, as and where required, in the context of privacy protection requirements focusing on ILCM aspects. (This approach is similar to that taken for Clause 8 in this document which also applies normative text from others parts of ISO/IEC 15944 and applies it in a privacy protection requirements and ILCM context.)
A common requirement of external constraints of a public policy nature is that they mandate records retention (and deletion) requirements, (e.g., consumer protection, privacy protection, etc.). In order to bridge legal, operational, public policy and IT perspectives, records retention is defined as in an Open-edi context 50 as:
Open-edi records retention and disposal schedule (Oe-RRDS)
specification of a period of time that a set of recorded information (SRI) shall be retained by a Person in order to meet operational, legal, regulatory, fiscal or other requirements as specified in the external constraints (or internal constraints) applicable to a Person who is a party to a business transaction
50 Multiple definitions exist for “records retention” within a single jurisdictional domain as well as among jurisdictional domains, professional organizations, etc. In order to differentiate the concept of “records retention” within the context of e-business, e-government, etc., i.e., an Open-edi context, a unique label or term has been invented/coined, i.e. that of “Open-edi records retention and disposal schedule (Oe-RRDS). This “generic” Open-edi definition links to privacy protection requirements in that these are legal or regulatory in nature.
© ISO 2014 – All rights reserved 85
318
3136
3137
313831393140
31413142
314331443145314631473148
31493150
315131523153
31543155
3156315731583159
31603161
31623163
31643165316631673168
316931703171
3172
317331743175
319320321322323
![Page 86: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/86.jpg)
CD ISO/IEC 15944-12:2014(E)
As stated in ISO/IEC 15944-1 records retention requirements need to be specified:
in the scoping of an Open-edi scenario, (e.g., as a Post-actualization requirement, of a Data Component requirement);
as an attribute of an Information Bundle, (e.g., for specifying internal constraints). {See ISO/IEC 15944-1 Clause 8.5.2.8 and Rule 140; and, for external constraints, see ISO/IEC 15944-1, Clause 8.5.2.9 and Rule 141}.
It is important to be able to specify which of the parties to a business transaction is responsible for retention of IBs or the complete set(s) of recorded information.51
Many, if not most, of the privacy protection requirements are of an information management nature. A key reason here is that privacy protection requirements are a type of information law. Consequently, the integrated set of information life cycle management (ILCM) principles applies.
Rule 044:Management and control of state change, retention and destruction of personal information shall be based on the application of the integrated set of information life cycle management (ILCM) principles.
7.2 Rules governing establishing ILCM responsibilities for personal information
It is important that in the modelling of a scenario for a business transaction that one establish which party (or combination of parties) to business transaction has (primary) responsibility for ILCM aspects.
Rule 045:Where an individual is a buyer to a business transaction, the seller shall specify who is responsible for the retention and disposal of any (combination) of SRIs and in particular all SPIs and do so during, or before, the negotiation phase and no later than at the actualization phase in accordance with privacy protection requirements.
Guideline 045G1:Unless required to be otherwise or negotiate otherwise, the default is that the Person in the role of seller is responsible all aspects of ILCM of the SRIs pertaining to a business transaction and especially all SPIs.
Rule 046:Where an individual is a buyer in a business transaction, the seller shall ensure that all other parties to the instantiated business transaction, as applicable, (e.g., a regulator, an agent, and/or third party) are informed of records retention (and disposal requirements) and agree to abide by and support them.
Guideline 046G1:In support of Rules 045 and 046, the seller, as well as any other parties to the business transaction involving an individual as buyer, (e.g., a regulator, an agent, and/or third party) should use ISO/IEC 15944-2 Coded domain 02 Codes Representing Specification of Records Retention Requirements. This coded domain is presented below as Table 01.
Guideline 046G2:The nature of the goods, services, and/or rights of the business transaction may limit or specify which of the options in coded Domain ISO/IEC 15944-12:01 can be used or are valid.
Guideline 046G3
51 The concept of “information bundle (IB)” pertains to the grouping of one or more semantic components(SCs) of data interchanged among Open-edi parties to a business transaction. From a data management perspective and. in an ILCM context, the concept of “set of recorded information (SRI) is used. An SRI can be the content value of a single data element, several grouped and managed together, a complete record or file, etc.
86 © ISO 2014 – All rights reserved
325
3176
31773178
317931803181
31823183
318431853186
318731883189319031913192
319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222
326327328329
![Page 87: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/87.jpg)
CD ISO/IEC 15944-12:2014(E)
Use of an ID Code 02 in Coded Domain ISO/IEC 15944-12:01 is considered a “rarity” and the individual as a prospective buyer in a business transaction should be informed of the rationale for being responsible for ILCM requirements pertaining to the relevant personal information
Rule 047:Unless otherwise specified by the seller the business transaction number (BTN) shall serve as its common unique ID for the instantiated business transaction for linking ILCM requirement to applicable SRIs..
External constraints of a public policy nature such as privacy protection (and consumer protection as well) require, i.e., make mandatory, both (1) the retention of personal information pertaining to a business transaction where the individual is the buyer; and, (2) the assured destruction of personal information based on both legal requirements and contractual obligations. {See further above Annex D (Normative) Integrated set of information life cycle management (ILCM) principles in support of information law compliance}.
Project Co-Editors’ Notes:
1. This Part 12 Coded Domain 01 presented below as Table 1 is an amended and more detailed version of Coded Domain 02 in Part 5.
2. NOTE: These Project Co-Editors’ comments also apply to the other Part 12 Coded Domains presented in Clause 7.
Table 1 — ISO/IEC 15944-12:01 Codes representing specification of records retention responsibility for personal information52
ISO/IEC 15944-12:01 Codes representing specification of ILCM responsibility for personal information where the buyer is an individual
IT Interface Human Interface Equivalents (HIEs):Linguistic – Written Form
Source Authority ID
Coded Domain
ID
ID Code
ISO English ISO French
15944-12 01 00 other autre
15944-12 01 01 seller is responsible for all ILCM aspects and shall inform the buyer of what they are
15944-12 01 02 Individual as buyer is responsible for ILCM aspects and the seller shall specify what these are53. | (Note: The seller shall inform the buyer of the basis as to why ILCM responsibilities are assigned to the buyer.)
15944-12 01 03 seller and buyer are both responsible and seller shall inform the buyer, as individual, what his/her ILCM responsibilities are
15944-12 01 04 Seller shall specify to the individual as buyer what specific IBs to retain as resulting from the business transaction
52143 NOTE: Should there be a requirement for additional conditions for the specification of records retention responsibilities these can be added via a Technical Corrigenda to this part of ISO/IEC 15944 or in the next edition of this part of ISO/IEC 15944.
53 Use of ID Code 2 is a “logical” possibility. Its use should be considered a “rarity”
© ISO 2014 – All rights reserved 87
331
32233224322532263227322832293230323132323233323432353236
3237
32383239
32403241
32423243
332333334
335
![Page 88: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/88.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 15944-12:01 Codes representing specification of ILCM responsibility for personal information where the buyer is an individual
IT Interface Human Interface Equivalents (HIEs):Linguistic – Written Form
Source Authority ID
Coded Domain
ID
ID Code
ISO English ISO French
15944-12 01 05 seller and individual shall use a common third party, (e.g., a notary)
15944-12 01 06 regulator is responsible for retaining the personal information54
15944-12 01 07 regulator and seller are responsible
15944-12 01 08 regulator and individual are responsible. (The buyer as individual is informed of the personal information being retained)
15944-12 01 09 regulator, buyer and individual are all responsible. (The buyer as individual is informed of the personal information being retained).
15944-12 01 10 regulator mandates the involvement of a (role) qualified or designated third party, i.e., on behalf of seller, the individual and regulator.55
15944-12 01 98 not known inconnu
15944-12 01 99 not applicable sans objet
7.3 Rules governing establishing specifications for retention of personal information – applicable “SRI retention triggers”
External constraints of a record retention nature have requirements which specify (1) when a retention requirement is to start, i.e., via a limited number of triggers; and, (2) then a specified (minimum) retention period. On the whole, records retention requirements are triggered by an action or event. The basic conditions here from an external constraints perspective for "retention triggers" are limited. The most common ones are presented in the following Coded Domain 04 of ISO/IEC 15944-5 (and also Annex F in Part 8). It has been amended in the context and focus of Part 12.
Rule 048:Where an individual is a (potential) buyer to a business transaction, the seller shall specify the “retention triggers” activating records retention requirements for the SRIs (and any combination of the same) pertaining to that business transaction and do so in accordance with applicable privacy protection requirements of the applicable jurisdictional domain(s) for that business transaction..
Guideline 048G1:In support of Rule nn, the seller as well as any other parties to the business transaction, (e.g., a regulator, an agent, and/or third party) should use the ISO/IEC 15944-12 Coded Domain 02 “Codes representing retention triggers for retention and disposition of personal information”.
54 An example would be the personal information for a driver’s license, or any other transaction where the regulator is the “authoritative” source.
55 Examples include notarial acts, a regulator assigning a record-keeping registry, etc., function to a third party.
88 © ISO 2014 – All rights reserved
337
3244
32453246
324732483249325032513252
32533254325532563257325832593260326132623263
338339
340
![Page 89: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/89.jpg)
CD ISO/IEC 15944-12:2014(E)
Table 2 — ISO/IEC 15944-12:02 Codes representing SRI retention triggers for retention of personal information56
ISO/IEC 15944-12:02 Codes representing SRI retention triggers for retention and disposition of personal information
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain
ID
IDCode
ISO English ISO French
15944-12 02 00 other autre
15944-12 02 01 start applicable retention period at the date/time for set(s) of recorded information as received, created and/or collected as part of the “identification phase” of the business transaction
15944-12 02 02 start applicable required retention period at date/time for set(s) of recorded information as received, created or collected as part of the “actualization phase” of the business transaction (including those based results of completion of the “negotiation phase”)
15944-12 02 03 start applicable required retention period from date of last action or use of the SRIs with respect to the business transaction
15944-12 02 04 start applicable retention period at end of calendar year when the business transaction was completed at end of the “actualization phase”
15944-12 02 05 start applicable retention period at end of fiscal year when the business transaction was completed at end of the “actualization phase”
15944-12 02 06 start applicable retention period at end of calendar year when the business transaction was completed at end of the “post-actualization phase”
15944-12 02 07 start applicable retention period at end of fiscal year when the business transaction was completed at end of “post-actualization phase”
15944-12 02 99 not applicable 57 sans objet
56 NOTE: Should there be a requirement for additional conditions for the specification of records retention responsibilities these can be added via a Technical Corrigenda to this part of ISO/IEC 15944 or in the next edition of this part of ISO/IEC 15944.
57 This would apply to recorded information, i.e. A particular SRI, deemed to be ephemeral or transitory in nature (e.g., such as a “session cookie”).
© ISO 2014 – All rights reserved 89
342
326432653266
3267
343344345
346347
![Page 90: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/90.jpg)
CD ISO/IEC 15944-12:2014(E)
It is also important to state the actual retention period, i.e., temporally. At the same time, it is a not uncommon occurrence that privacy legislation, or pursuant regulation, does contain a minimum temporal period for the retention of personal information, particularly where such personal information pertains to decision-taking or commitment-making such as takes place in the formation of a business transaction.
In many jurisdictional domains it is a requirement (e.g., consumer protection-based), that the potential buyer is fully informed of all the conditions which apply to an eventual purchase of a good, service and/or right. Similarly, privacy protection requirements require informed consent with respect to any collection, use, sharing, retention, etc., of personal information where the buyer is an individual. This includes the seller providing full and complete information on the duration of the retention of personal information. These and related requirements are captured in the following rules.
The record retention period(s) for SRIs and associated IBs (and SCs) need to be specified and stated explicitly. The retention period is independent of the retention triggers.
Rule 049:The period that recorded information pertain to a business transaction where the individual is a buyer, is retained (as once or more SRIs) shall be specified and made known to the individual.
Guideline 049G1:In support of this Rule nnn, the seller as well as any other party (ies) to the business transaction, (e.g., a regulator, an agent and/or third party) should use the ISO/IEC 15944-12 Coded Domain 03 “Codes representing retention period.
Rule 050:
Where the (prospective) buyer is an individual, the seller shall inform the buyer of minimum record retention period(s) of applicable privacy protection requirements which apply where a business transaction enters the “identification phase” and further.
Guideline 050G1
Sellers should apply Rule 050 as a best business practice and inform all buyers of their applicable minimum retention period for SRIs of buyer information.
Rule 051:
Where the (prospective) buyer is an individual, the seller shall inform the buyer of a maximum record retention period(s) of applicable privacy protection requirements which apply where a business transaction enters the “identification phase” and further.
Guideline 051G1
Sellers should apply Rule 051 as a best business practice and inform all buyers of their applicable maximum retention period for SRIs of buyer information.
Rule 052:
Where the (prospective) buyer is an individual, the seller shall inform the buyer of any record retention period(s) as required by applicable laws or regulations requirements which apply and which “override” those of a privacy protection nature, including “permanent” retention where a business transaction enters the “identification phase” and further.
Rule 053:
Where the (prospective) buyer is an individual, the seller shall inform the buyer of the record retention period(s) of applicable privacy protection requirements (other than those of a minimum or maximum nature) which apply where a business transaction enters the “identification phase” and further.
90 © ISO 2014 – All rights reserved
349
3268326932703271
327232733274327532763277
327832793280328132823283328432853286328732883289
3290
329132923293
3294
32953296
3297
329832993300
3301
33023303
3304
3305330633073308
3309
331033113312
![Page 91: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/91.jpg)
CD ISO/IEC 15944-12:2014(E)
Table 3 — ISO/IEC 15944-12:03 Codes representing the specification of types of record retention period
ISO/IEC 15944-12:03 Codes representing the specification of types of record retention period
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain
ID
IDCode
ISO English ISO French
15944-12 03 00 other autre
15944-12 03 01 Minimum retention period is stated in applicable privacy protection requirements58
15944-12 03 02 Maximum retention period as stated in applicable privacy protection requirements. (Seller to provide information to individual as buyer )59
15944-12 03 03 Nature of the good, service and/or right as the goal of the business transaction invoke other minimum retention periods which of a longer temporal nature than that of privacy protection requirements60 (Seller to provide information to individual as buyer)
15944-12 03 04 Nature of the good, service and/or right as the goal of the business transaction requires permanent retention of specified personal information.61
15944-12 03 05 The retention period is specified using date/ time referencing based on the ISO 8601 standard, i.e. a temporal period specified in years, months, weeks, days, hours, minutes, etc., a.k.a the .Gregorian calendar.62
15944-12 03 06 The retention period is specified based on a temporal referencing schema other than that based on ISO 8601 standard, and if so needs to be
58 A common default for personal information is two (2) years after business transaction completed. For SRIs of a financial nature it is a minimum retention period of seven (7) years.
59 For example, IBs pertaining to the use of a telecom service often have a maximum retention period after which the telecom provide deletes the record of the same. This varies per jurisdictional domain.
60 An example here would be financial information pertaining to an actualized business transaction where financial information may have to be retained for a minimum of seven years.
61 A code “04” would apply to the purchase and sale of what are commonly known as “immovables” (e.g., a piece of land, a house, etc.
62 On temporal referencing, see further, ISO/IEC 15944-5, Clause 6.6.45 titled “Date/Time referencing”
© ISO 2014 – All rights reserved 91
351
331333143315
352353
354355
356357
358359
360
![Page 92: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/92.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 15944-12:03 Codes representing the specification of types of record retention period
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain
ID
IDCode
ISO English ISO French
specified63
15944-12 03 07 ??
15944-12 03 08 ??
7.4 Rules governing identification and specification of state changes of personal information64
7.4.1 Introduction
A fundamental aspect of data management and interchange among autonomous Persons (or even within an organization or public administration) is that of ensuring the accuracy, timeliness and relevancy of its (sets of) recorded information (SRI). A second fundamental aspect here is that any Person (or whatever nature) shall do so in compliance with applicable external constraints of the relevant jurisdictional domain.
A key characteristic of Open-edi is that "parties control and maintain their states". {See Clause 5.4, ISO/IEC 15944-1} As such, it is important to know whether or not the value of an Information Bundle (IB) (or one of its Semantic Components (SCs) interchanged among parties to a business transaction is allowed to be changed during any stage in the process component. Knowing whether or not state changes are allowed for a specific IB or SC is important for the management of state description and automated change management of the state machines of the parties involved in an electronic business transaction.
This is a requirement which also exists in modelling business transactions involving internal constraints only. However, those which exist here are likely to be a sub-set of those which arise from external constraints.
It is not that during the life cycle of a business transaction, i.e., from its planning through post-actualization phases, that are more of the SRIs which are personal information in nature and pertain to the business transaction may require a state change to their content value(s). For example, the address of the buyer as individual may change or the planned delivery date, delivery location, etc.
At the same time, there are SRIs pertaining to personal information in a business transaction for which no state changes are allowed, (e.g., the Business Transaction Number (BTN).
It is also understood that with respect to any personal information pertaining to an individual as a party to a business transaction, that privacy protection requirements.
Rule 054:Where the recorded information pertaining to a business transaction contains personal information (as one or more SRIs), the seller shall specify: (a) for which such SRIs, there will be no state changes; and, (b) for which SRIs state changes are allowed and, if so, under which conditions.
63 See ftnt. 60 above. The Clause in Part 5 provides information on other temporal referencing schemas such at the “atomic clock”, the “GPS calendar/clock”, etc.
64 This Clause integrates applicable text and rules of Clause 6.6.4.3 of Part 5, and that of Clause F.2 in Part 8.
92 © ISO 2014 – All rights reserved
364
3316
33173318331933203321
3322
3323332433253326
332733283329333033313332
33333334
3335333633373338
33393340
33413342
33433344334533463347
365366
367
![Page 93: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/93.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule 055:A business involves an individual as a buyer in a business transaction the seller shall inform and obtain informed consent from the buyer, as individual, to any state changes to any SRIs pertaining to the business transaction, including those forming the basis for (one or more SCs or SRIs), as IBs in EDI with parties to a business transaction.
A related issue is that of “What happens to recorded information, i.e., SRIs, which existed prior to a state change being made”? It is important for parties to a business transaction to know this. In summary, two attributes are required to specify state change of data. They are:
number of state changes allowed, if any; and,
store change type.
The inter-working of these two attributes, i.e., as codes in two coded domains, covers the various combinations of state changes in the data value for each IB and SC as well as what actions are required with respect to both “new” and “old” data including those required for information life cycle management (ILCM) within an organization, audit trails, evidentiary requirements, disposition/expungement, etc., and any external constraints of this nature of jurisdictional domains.
7.4.2 Specification of state changes allowed to personal information
Rule 056:Where an individual is a party to a business transaction, i.e., as a buyer, the seller (as an organization or public administration) shall have in place rules governing state changes, if any, for personal information (at whatever level of granularity required) in support of ILCM and EDI required to comply with privacy protection requirements.
Rule 057:Where the buyer is an individual, the seller shall inform the buyer whether or not state changes will be allowed for one or more of the SRIs constituting the recorded information pertaining to that business transaction.
Guideline 057G1:Depending on the nature of the good, service and/or right which is the goal of the business transaction external constraints of applicable jurisdictional domain(s) may prohibit a state change to one or more SRIs.
An example of use of Code “0” would be the transaction record ID number as the business transaction identifier (BTI), {See further Clause 11.2 above} i.e., the unique ID number assigned by the seller to an instantiated business transaction. Codes “1”, “2”, “3”, etc., are used to deal with IBs and SCs pertaining to location information, (e.g., physical or electronic addresses), price and terms negotiations, the buyer changing its decision on a choice of options, etc.
An example of an IB (or SC) having a Code “09” with respect to state changes would be in item tracking in a logistics system, (e.g., the seller provides to a buyer a facility to access the seller or logistic provider system to track the movement of an item to be delivered to the buyer). The content value of the related SRI would undergo state changes of a dynamic basis.
Note: If several SRIs pertaining to a business transaction are allowed to be changed, care must be taken to prevent the business transaction from transforming itself into a completely new business transaction. A factor to be considered is for those SRIs allowing (too many) changes may lead to “disharmony” among the various SRIs, thereby compromising the integrity of the recorded information on a business transaction. For example, as already stated below as a rule, no state change shall be allowed to the BTN on an instantiated business transaction
Rule 058:An instantiated business transaction shall have one or more IB or SC for which no state changes are permitted. One of these is to serve as the transaction ID number, i.e., a business transaction identifier (BTI), for the instantiated business transaction.
© ISO 2014 – All rights reserved 93
369
33483349335033513352335333543355335633573358
3359
33603361336233633364
3365
336633673368336933703371337233733374337533763377337833793380338133823383338433853386
3387338833893390
339133923393339433953396
3397339833993400
![Page 94: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/94.jpg)
CD ISO/IEC 15944-12:2014(E)
Guideline 058G1:It is advised that in modelling scenarios, scenario attributes roles, information bundles and scenario components that one set the state change code to “00” wherever applicable especially for those pertaining to personal information.
This Guideline serves to ensure that all parties to a business transaction agree to and have knowledge of permitted state change to the value of an IB or SC.
Rule 059:If a state change is required, the seller (and/or regulator) shall specify the number of state changes permitted.
Guideline 059G1:In support of rules nn-a and nn-b, the seller as well as other parties to the business transaction as applicable, (e.g., the regulator, an agent, or third party) should use the ISO/IEC 15944-12 Coded domain 04 to specify the applicable state change ID codes.
94 © ISO 2014 – All rights reserved
371
34013402340334043405340634073408
34093410341134123413341434153416
![Page 95: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/95.jpg)
CD ISO/IEC 15944-12:2014(E)
Table 4 — ISO/IEC 15944-12:04 Codes for specifying whether state changes allowed for the content values of SRIs containing personal information65
ISO/IEC 15944-12-04 Codes for specifying whether state changes allowed for the content values of SRIs containing personal information
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain ID
ID Code ISO English ISO French
15944-12 04 000 no state change allowed (default)
15944-12 04 010 One state change allowed as per nature of business transaction
15944-12 04 011 One state change allowed as requested by buyer as individual
15944-12 04 012 One state changes allowed as requested by the seller and consented to by the buyer
15944-12 04 013 One state change allowed as may be required by the regulator
15944-12 04 020 Two state changes allowed as per nature of business transaction
15944-12 04 021 Two state changes allowed as requested by buyer as individual
15944-12 04 022 Two state changes allowed as requested by the seller and consented to by the buyer
15944-12 04 023 Two state changes allowed as may be required by the regulator
15944-12 04 030 Three state changes allowed as per nature of business transaction
15944-12 04 031 Three state changes allowed as requested by buyer as individual
15944-12 04 032 Three state changes allowed as requested by the seller and consented to by the buyer
15944-12 04 033 Three state changes allowed as may be required by the regulator
15944-12 04 090 No limit on the state changes allowed as per nature of the business transaction
15944-12 04 091 No limit on the state changes allowed as requested by the buyer as individual and agreed to
65 NOTE: Should there be a requirement for additional conditions for the specification of records retention responsibilities these can be added via a Technical Corrigenda to this part of ISO/IEC 5944 or in the next edition of this part of ISO/IEC 15944.
© ISO 2014 – All rights reserved 95
373
341734183419
374375376
![Page 96: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/96.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 15944-12-04 Codes for specifying whether state changes allowed for the content values of SRIs containing personal information
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain ID
ID Code ISO English ISO French
by the buyer
15944-12 04 092 No limit on the state changes allowed as per nature of the business transaction as requested by the seller and agreed to by the buyer as an individual
15944-12 04 093 No limit on state changes allowed as may be required by the regulator
7.4.3 Specification of store change type
It is important to specify clearly and explicitly the action to be taken and the processes to be followed by the seller (as well as its agents and third parties) with respect to the original content value of an SRI (and related IBs and SCs) when the content value for these is changed during any of the phases in a business transaction.
Rule 060:If a state change is permitted to the original data value of the SRI and resulting IB (or its associated SCs), i.e., (1) any entered in the DMA(s) of the IT system(s) of the organization or public administration which acting in the role of a seller or a regulatory in a business transaction involving an individual and/or as, (2) interchanged among the Persons involved, it is necessary to specify in the business object being modelled the store change type permitted.
Guideline 060G1:
In support of Rule 060, the seller as well as other parties to the business transaction as applicable. (e.g., the regulator, an agent or a third party) should use the ISO/IEC 15944-12 Coded Domain 05 to specify store change type.
The ID code in this coded domain defines and specifies what action is to be taken when a state change in the content value of a SRI is allowed. This is necessary to support required audit trails, data integrity and ILCM including archiving/disposition requirements as well as from a legal/evidentiary requirements perspective. The ID codes for Store Change Type in 66Table??? below identify whether the previous content value of an SRI are required to be retained, in addition to the most current data value. IF they are not required, the new value can replace the existing content value. If an audit history must be maintained then the relevant DMA in the IT system of the seller (and its agents and/or third parties) must be able to maintain multiple versions of the content value of the SRI including possible associated IT systems-generated date/time stamps.
Table 5 — ISO/IEC 15944-12:05 Codes representing store change type for SPIs (and SRIs)67
66 An example by analogy is that of an historical record of changes to the balance in one’s bank account. Another example, (linked to ISO/IEC 15944-9) is that of traceability data in the form of SRIs pertaining to the movement/logistics of a “good” being delivered from a seller to a buyer.-0o/
67 NOTE: Should there be a requirement for additional conditions for the specification of records retention responsibilities these can be added via a Technical Corrigenda to this part of ISO/IEC 15944 or in the next edition of this
96 © ISO 2014 – All rights reserved
378
3420
3421
342234233424
34253426342734283429343034313432
343334343435
34363437343834393440344134423443
3444
3445
379380381
382383
![Page 97: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/97.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 15944-12-05 Codes Representing Store Change Type for SRIs as Information Bundles and Semantic Components
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority
Coded Domain
ID
ID Code
ISO English ISO French
15944-12 05 00 other autre
15944-12 05 01 store new data value for the specified SRI and expunge previous data value
15944-12 05 02 store new data value, expunge previous value for the specified SRI with date/time stamp when state change occurred
15944-12 05 11 store new data value for the specified SRI and previous data value only
15944-12 05 12 store new data value for the specified SRI and previous data value for the specified SRI only and add a date/time stamp
15944-12 05 21 store new data value for the specified SRI and “nn” previous values for the specified SRI maintaining a sequence number of all state changes. here “nn” must be specified
15944-12 05 22 store new data value and “nn” previous values maintaining security, and maintaining a date/time stamp for each state change. Here “nn” must be specified set of unique identifiers.
15944-12 05 31 store new data value for the specified SRI and all changes maintaining a sequence number of all state changes for the specified SRI
15944-12 05 32 store new data value for the specified SRI and all changes, maintain a date/time stamp for each state change for the specified SRI
15944-12 05 99 not applicable, i.e., no state change allowed 68
One notes that a code “99” here works in tandem with a Code “00” in the previous Coded Domain. Use of a Code “01” or “02” means that having the previous value only is sufficient. This is often the case for change in location, (e.g., for physical or electronic address information). The use of the other codes links to ensuring record of decision, audit trails, evidentiary requirements and other external constraints which may apply due to the nature of the business transaction.
part of ISO/IEC 15944.
68 For example, a code 99 here is automatic when a code 00 was assigned to the SRI or SPI based on Coded Domain 4 in ISO/IEC 15944-12.
© ISO 2014 – All rights reserved 97
385
3446
34473448344934503451
3452
386
387388
![Page 98: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/98.jpg)
CD ISO/IEC 15944-12:2014(E)
7.4.4 Rules governing specification of source of state changes
Basically there are three primary sources of state changes to SRIs pertaining to a business transaction namely: (1) those initiated by the buyer; (2) those initiated by the seller; and, (3) those required by applicable external constraints.
The state change requirements of these three sources are not necessarily exclusive and may well be complementary to each other.
Rule 061:In order to comply with privacy protection requirements, the source of the state change to a content value of any SRI forming part of a business transaction shall be specified as seller, buyer, and/or an external constraint.
Guideline 061G1:
In support of Rule 061, the seller as well as other parties to the business transaction as applicable. (e.g., the regulator, an agent or a third party) should use the ISO/IEC 15944-12 Coded Domain 06 to specify source of state change type. (and an ID code of “99” for those SRIs for which no state change is allowed). It is noted that use of one or more the ID codes in this Coded Domain are not exclusive but may well be complimentary.
Table 6 — ISO/IEC 15944-12:06 Codes representing source of state change type ID code for SRIs69
ISO/IEC 15944-12-06 Codes representing source of state change type ID code
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority
Coded Domain
ID
ID Code
ISO English ISO French
15944-12 06 01 Buyer originated, i.e., the buyer as an individual is the only one who can request a state change to the content of one or more SRIs pertaining to a business transaction.
autre
15944-12 06 02 Seller originated, i.e., those which the seller identifies and proposes to the buyer as a state changes associated with the business transaction.
15944-12 06 03 Regulator originated, i.e. those which apply to the nature of the good, service and/or right and which are identified as such by the seller to a (prospective) buyer in a (proposed) business transaction.
15944-12 06 11 The seller has informed the buyer of conditions pertaining to ID codes 01. 02 and 03, and the buyer has agreed to the application of a combined combination of the same , i.e., as a result of the negotiation phase, with respect to the business transaction to be actualized
15944-12 06 ??
69 NOTE: Should there be a requirement for additional conditions for the specification of records retention responsibilities these can be added via a Technical Corrigenda to this part of ISO/IEC 15944 or in the next edition of this part of ISO/IEC 15944.
98 © ISO 2014 – All rights reserved
390
3453
345434553456
3457345834593460346134623463
3464
34653466346734683469
3470
391392393
![Page 99: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/99.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 15944-12-06 Codes representing source of state change type ID code
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority
Coded Domain
ID
ID Code
ISO English ISO French
15944-12 06 ??
15944-12 06 99 Not applicable, i.e., no state change is allowed, (therefore source of state change does not apply)
7.5 Rules governing disposition of personal information
Project Co-Editors” Notes:
1. Within the information/document management community, the concept and application of the process. actions pertaining to “disposition” of any SRI are well understood. They include those aspects which are already covered by IS standards of ISO TC46/SC11 (see those ISO standards identified in initial Project Co-Editors’ Notes to this CD document.
2. However within the JTC1/SC32 community of participating P-members and individual experts, participating in one or more WGs of JTC1/SC32, the importance of applicability and incorporation of ILCM aspects and applicable in ‘ JTC1/SC32 “Data Management’ standards for “Data Management and Interchange”{ are not either appreciated or understood.
2. In addition, the “disposition” action with respect to any SPECIFIED set of recorded information, i.e., as an SRI or a combined set of SRIs basically has the same set of disposal actions. |These are presented below but are conditioned governed by those which are applicable and pertain to any SRI containing “personal information is not addressed in current JTC1/SC32 standards including those which pertain to JTC1/SC32/WG2 “Metadata” and SC32/WG3 & WG4 SQL related standards.
4. Here from a privacy protection requirements standard perspective for any “personal information” whether from an (a) metadata perspective, when and wherever any personal information is of a “metadata” nature or not; and/or includes application and use of JTC1/SC32 “SQL standards”, it is important that any such existing and all existing/future personal information is of a “direct” personal information: is mature, or an “indirect “metadata” personal information nature” is recognized as being ot the same personal information requirements, i.e., as sets of applicable external constraints.
This clause integrates applicable text and rules of Clause 6.5.4.3 Part 5, and Clause F.4 Part 8. It does so in a privacy protection requirements context and from a, more granular, ILCM needs perspective.
A key privacy protection requirement is that of the mandatory destruction of personal information, i.e. as the reverse of records retention. Within an information/records management and archiving context this process requirement of an organization is known as "disposition". Disposition is an authorized action to remove, i.e., alienate, a set of recorded information, from under the control of a Person and thereby extinguishing ownership and accountability70. In the context of this part of ISO/IEC 15944, “Open-edi disposition” is defined as:
Open-edi disposition
70 This is more than “erasing” or “deleting” an SRI in an IT system. From an “evidentiary” requirements perspective, the requirement here is that of “expungement” (= eliminate completely, wipe out, destroy or obliterate an electronic record).
© ISO 2014 – All rights reserved 99
395
3471
34723473
3474
3475347634773478
3479348034813482
34833484348534863487
348834893490349134923493
34943495
349634973498349935003501
3502
396397
![Page 100: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/100.jpg)
CD ISO/IEC 15944-12:2014(E)
process governing the implementation of formally approved records retention, destruction (or expungement) or transfer of recorded information under the control of a Person which are documented in disposition authorities or similar instruments
NOTE Adapted from ISO 15489-1:2001
Within the purpose of this 1st edition of Part 12, only the more basic, i.e., primitive, disposal actions are identified. However, even this limited set covers more than 85% of the statutory requirements and best business practices of most organizations world-wide, and especially those of public administrations.
A key aspect of a “disposition” action is that the specified SRI(s) is removed from the normal and ordinary course of business use of the organization, i.e. “control”. Another key aspect of any disposal action is that no state changes of any kind are allowed to the content value of any SRI(s) which has been “disposed” by the organization.
While the normal default result of a disposition action is the destruction, i.e., expungement of the recorded information, it is not uncommon for other results of a disposition action to occur. Examples of these include:
> the transfer of the “disposed” SRI(s) to an archive (IT system) within the organization, and if so with the same or different access and use controls71;
> the transfer of the “disposed” SRI(s) to an archive (IT system) of (a) an agent of the organization 72; (b) an organization which is a third party to the organization73; or, (c) a totally separate, and largely removed, separate organization;
> the transfer of personal information by an organization for (officially recognized) research purposes 74; along with associated legally supported access and use requirements, including formally accepted (and legally permitted) access and use protocols, specified via formal rules (and associated guidelines) and supported by applicable coded domain as necessary/applicable. Here such transfers may need to incoprate ensure “individual anonymity”
? other?
Rule 062:Where the buyer in a (prospective) business transaction identifies himself/herself as an “individual” is in the “identification phase’ of a business transaction, the (prospective) seller shall inform the (prospective) buyer of any and all ILCM conditions and options as part of the applicable personal information privacy protection requirements and associated rules required to be provided by the buyer as part of the “planning phase’ or at the latest at the end of the “identification phase” and no later of a potential business transaction
71 For example, when an SRI(s) has as disposal action to be assigned the status of “archival”, it is normally physically removed from the DMA of the organization and transferred to the “archival IT system” of the organization at which time access to and use of such SRI(s) fall under the control of the |Archivist”, as an officer of the organization.
72 A common example here is an organizational entity of a public administration, i.e. an organizational entity of a jurisdictional domain government organization which has established a separate and distinct organizational part” as a separate entity governed by separate legislation, regulation (or similar legal instrument) which have as result, from a Part 12, context and perspective, of having its own distinct legal basis and associated rules for access to and use of such associated personal information for all the SRIs which constituting the specified “archival collection” for that natural person which are physically (and logically) maintained as a distinct “collection” the specified archival repository. In addition, it is not an uncommon occurrence for all the personal information (public or private) for a “very important person (VIP” in an organization to be transferred to a new separate organization, or legal entity within an existing organization (e.g., as a “presidential Archive, a Prime Ministerial Archive”, a private archive (including those of a university), etc.
73 An example here is that of a private sector organization disposing of its specified SRIs to a university or a private sector (often non-profit) organization.
74 A primary example here is that of public administrations providing personal information on specified data elements relating to an (identified) individual on a systematic, including, continuous basis to with respect to an officially approved research project
100 © ISO 2014 – All rights reserved
399
350335043505
3506
350735083509
3510351135123513
35143515
35163517
351835193520
35213522352335243525
3526
35273528352935303531353235333534
400401402
403404405406407408409410411
412413
414415416
![Page 101: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/101.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule 063:Where an individual is a buyer to a business transaction, the seller shall specify the disposition action to be taken at the end of the expiry of the record retention period in accordance with privacy protection requirements of the applicable jurisdictional domain as well as those applicable to the nature of the product, service and/or right which is the agreed upon goal of the (to be) actualized, business transaction=, and in particular those SRI retention requirements which are mandatory based on the nature of a the good, service and/or right which is the agreed upon goal of the business transaction
Guideline 063G1:In support of Rule 063, the seller as well as any other parties to the business transaction, (e.g., a regulator, an agent, and/or third party) should use the ISO/IEC 15944-12 Coded Domain 05 “Codes representing disposition of personal information”.
It is also a common and well-established practice for sets of personal information (SPIs) to be scheduled and disposed of via by their transfer to an archive for historical and research purposes. As a matter of fact, many jurisdictional domains have in place legislation (and pursuant regulations) for this purpose (e.g., in the form of a “National Archives Act”, a “Medical research Act’, legally enforced protocols governing access and use of personal information retained as part of longitudinal research, sampling, etc. This is especially so with respect to public administrations.
On the whole , once a SRI is “disposed”, according to the applicable RRDS, the content value(s) are not, cannot be changes, i.e., if state changes were permitted before on the SRI while it was active and being retained, once it is disposed no more state changes are allowed. Where SPIs including SRIs, are not destroyed/expunged as the disposal action, they are transferred to an archive either within the organization itself or to archive of another organization as per (legal/contractual) agreement as so supported by applicable information law.
Certain types of SRI and associated SPIs resulting from completing the goal of a business transaction, may be required to be retained permanently. This so for various types of business transactions which do not have any “post-actualization” requirements. Examples of these include educational records, i.e. those pertaining to completion of high school, a degree at a college or university, sale and transfer of an immovable property, etc.
Rule 061:
Where the disposition action of an SRI, and in particular that of a SPI, is that of transfer to an archive to be retained permanently, i.e., as “permanent” SPI or SRI, no further state changes are allowed for the same.
Guidelines 061G1:
Where the condition of Rule 061 applies, it is advised that one use the ID Cods 11 or 12 in Coded domain 07.
In addition, it can happen that the individual would like to organization to retain its SPIs (and associated SRIs) after the scheduled disposition date/action. This approach is provided for in privacy protection, as a corollary to the organization to be able to ask an individual whether or not PI collected for one purpose, may be used and retained for another purpose.75.
Rule 062:Where the disposition action of an SRI, and in particular that of an SPI, is that to be retained permanently for historical or research purposes, i.e., as a “permanent” SPI or SRI, no further state
75 For example, an organization may have established a dossier on an individual, with the individual’s consent with respect to security clearance, level of competency and qualifications, etc., especially those which include letters of reference, certified copies of key documents, etc. It may very well be that according to applicable privacy protection the p[particular applicable SPI(s) is mandated too be destroyed /expunged two years after last use. requirements, However, the individual concerned, having expended significant resources and time to compile the dossier and have it accepted by the organization, including the organization
© ISO 2014 – All rights reserved 101
418
353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561
3562356335643565
3566
356735683569
3570
357135723573357435753576357735783579358035813582
419420421422423424
![Page 102: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/102.jpg)
CD ISO/IEC 15944-12:2014(E)
changes are allowed, and the SPIs (or SRIs) are subject to ne access and use conditions as well as no longer permitted to be used for decision-making actions with respect to the individual who SPI(s) it is.
Guideline 062G1:Where the condition of Rule 062 applies, it is advised that one use the ID Code 13 in Coded Domain 07.
Table 7 — ISO/IEC 15944-12:07 Codes representing disposition types as actions of personal information (as SPIs)76
ISO/IEC 15944-512;007 Codes representing disposition of personal information (as SPIs)
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain
ID
ID Code
ISO English ISO French
15944-12 07 00 other autre
15944-12 07 01 Disposition as destruction, i.e., total expungement of the applicable SRI(s) by the organization which controls the ILCM aspects of the specified personal information as SPIs.
This not only includes expungement by he seller as the originating institution, i.e. ,Person, ensuing that any of its associated agents and/or third parties, to the relevant business transaction
15944-12 07 02 Disposition as destruction, i.e. total expungement of the applicable SPI (and related) SRIs) and notification to the individual of the disposal action
15944-12 07 10 Disposition via transfer to an archival institution for permanent retention or specified time period retention – General (no further state changes are permitted)
15944-12 07 11 Disposition via transfer to an archival institution which functions as a separate legal entity. (When such a transfer takes place no further state changes are allowed to the SPI(s) and its related SRI(s).
15944-12 07 12 Disposition via transfer to another organizational entity (within the same organization, as an archival record. (When such a transfer takes place no further state changes are allowed to the SPI(s) and its related SRI(s).
15944-12 05 13 transfer to an archival institution (for historical and research purposes).
76 NOTE; Should there be a requirement for additional conditions for the specification of records retention responsibilities these can be added via a Technical Corrigenda to this part of ISO/IEC 15944 or in the next edition of this part of ISO/IEC 15944.
102 © ISO 2014 – All rights reserved
426
358335843585358635873588358935903591
427428429
![Page 103: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/103.jpg)
CD ISO/IEC 15944-12:2014(E)
ISO/IEC 15944-512;007 Codes representing disposition of personal information (as SPIs)
IT Interface Human Interface Equivalents(HIEs): Linguistic –Written Form
Source Authority ID
Coded Domain
ID
ID Code
ISO English ISO French
(When such a transfer takes place no further state changes are allowed to the SPI(s) and its related SRI(s), and specified (new) access and use conditions apply).
15944-12 05 20 Destruction of the complete SRI, including its SPIs by the organization with return to individual whose personal information it is (e.g., via a printout of the (final) record, an e-mail with a .pdf, file, etc.)
15944-12 05 30 Other?
15944-12 05 98 not known inconnu
15944-12 05 99 not applicable 77 sans objet
77 This would apply to recorded information deemed to be transitory or ephemeral which can be discarded anytime.
© ISO 2014 – All rights reserved 103
431
3592
432
![Page 104: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/104.jpg)
CD ISO/IEC 15944-12:2014(E)
8 Rules governing EDI of personal information between primary ILCM Person, i.e., the seller, and its “agent”, “third party” and/or “regulator”
Project Co-Editors’ Notes
1. CD ballot comments on this Clause are welcome.
2. One question is “Should “primary ILCM Person” be a defined concept?” It links to the fact that someone needs to be identified and be responsible for the maintenance of the “source/original/core” personal information (and SPIs) pertaining to a business transaction. as well as related data synchronization requirements On the whole this is the seller, by default. This is similar to the approach and practices in the financial services sector where there is always a designated financial institution responsible for maintaining and updating a source financial record (=account).of an individual.
8.1 Introduction
This Clause 8 integrates and summarizes existing normative text and rules of Clauses 6.2.3.-> Clause 6.2.6 of Part 1 and of (many) applicable Clauses in Part 8 such as .its Clause 5.3.2 “.Privacy Protection Principle 2: Accountability/
This Clause 8 focuses on EDI aspects of personal information, i.e., criteria and rules which must be complied with by both the primary ILCM Person, i.e., the seller, and a prospective “agent” and or “third party” prior to the seller deciding to use an “agent”, or “third party” as a separate autonomous party, in support of an instantiated business transaction where the buyer is an individual.
The increased use of organizations to outsource some or most of their IT systems including their DMAs and related processing to “cloud-based” services increases the important of ensuring that applicable ILCM aspects of SPIs continue to be supported.78
With respect to the engagement of a third party in a business transaction, it is already stated in Clause 6.2.5 of ISO/IEC 15944-1, that a third party is not an agent of either the buyer or seller but is one who fulfils a specific role or function in the execution of a business transaction as mutually agreed to by the two primary Persons or as a result of applicable external constraints.
8.2 ILCM rules pertaining to use of an “agent”
A seller should not interchange SPIs its agent(s) unless the agent has in place procedures and mechanisms which support privacy protection requirements.
Rule 063:Where a seller uses an agent, the seller shall ensure that before interchanging any personal information with an agent (and its IT System), the seller ensures that the agent (and its IT Systems) support applicable privacy protection requirements.
Guideline 063G1:
Prior to an organization delegating part (or all) of the instantiation of a business transaction to an agent, the organization should obtain (written) assurance of the “agent’s compliance with privacy protection requirements and particularly in the DMAs in the IT systems of the agent.
Rule 064:Where a state change occurs to personal information pertaining to a business transaction, and the seller has interchanged such personal information to its agent(s), the seller shall notify the agent of such a state change(s) and the agent shall acknowledge receipt of the same and verify that it has made the same state change in its IT Systems.
Rule 065:
78 Users and implementers of Parts 12 are urged to familiarize themselves with the text and rules of Part 8, Clause 5.3.2.
104 © ISO 2014 – All rights reserved
434
35933594
3595
3596
359735983599360036013602
3603
360436053606
3607360836093610
361136123613
3614361536163617
3618
361936203621362236233624362536263627
362836293630
3631363236333634363536363637
435
![Page 105: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/105.jpg)
CD ISO/IEC 15944-12:2014(E)
Where a seller uses an agent and interchanges personal information pertaining to a business transaction, the seller shall ensure that the agent in its IT Systems supports applicable records retention and disposal scheduling of that personal information.
Guideline 065G1:A seller can ensure that records retention and disposal requirements pertaining to personal information of a seller in a business transaction are maintained by its agent(s) through the use of state changes.
For example, when the seller destroys, i.e., expunges the personal information as required pertaining to a specified business transaction, the seller could send a state change whereby as the SCs (and IBs) pertaining to that business transaction would be changed in their content value to “000”.
Rule 066:
At the completion of a business transaction, where the buyer is an individual and the seller does not dispose of all related SPIs but instead transfer those SPIs to an archive for add temporal or permanent retention, the seller shall inform the individual of the same along with (new) access and use provisions which may apply, and where applicable the name and coordinates of the agent, i.e., another party, rather than by the organization itself.
8.3 ILCM rules pertaining to use of a “third party”
Rule 067:Where a seller uses a third party, the seller shall ensure that before interchanging any personal information with a third party (and its IT System), the seller ensures that the agent (and its IT Systems) support applicable privacy protection requirements.
A seller should not interchange IBs or SCs with its agent(s) unless the third party has in place procedures and mechanisms which support privacy protection requirements.
Rule 068:Where a state change occurs to personal information pertaining to a business transaction, and the seller has interchanged such personal information to its third party (ies), the seller shall notify the agent of such a state change(s) and the third party shall acknowledge receipt of the same and verify that it has made the same state change in its IT Systems.
Rule 069:Where a seller uses a third party and interchanges personal information pertaining to a business transaction, the seller shall ensure that the third party in its IT Systems supports applicable records retention and disposal scheduling of that personal information.
Guideline 069G1:A seller can ensure that records retention and disposal requirements pertaining to personal information of a seller in a business transaction are maintained by its third party (ies) through the use of state changes.
For example, when the seller destroys, i.e., expunges the personal information as required pertaining to a specified business transaction, the seller could send a state change whereby as the SCs (and IBs) pertaining to that business transaction would be changed in their content value to “000”.
Rule 070:
At the completion of a business transaction, where the buyer is an individual and the seller does not dispose of all related SPIs but instead transfer those SPIs to an archive for add temporal or permanent retention, the seller shall inform the individual of the same along with (new) access and use provisions which may apply, and where applicable the name and coordinates of the third party, i.e., another party, rather than by the organization itself.
© ISO 2014 – All rights reserved 105
437
363836393640364136423643364436453646364736483649
3650
36513652365336543655
3656
36573658365936603661366236633664
3665366636673668366936703671367236733674367536763677367836793680368136823683
3684
36853686368736883689
![Page 106: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/106.jpg)
CD ISO/IEC 15944-12:2014(E)
8.4 ILCM rules pertaining to involvement of a “regulator”
Rule 069:Where a seller uses a regulator, the seller shall ensure that before interchanging any personal information with a regulator (and its IT System), the seller ensures that the agent (and its IT Systems) support applicable privacy protection requirements.
A seller should not interchange IBs or SCs with its agent(s) unless the agent has in place procedures and mechanisms which support privacy protection requirements.
Rule 070:Where a state change occurs to personal information pertaining to a business transaction, and the seller has interchanged such personal information to a regulator(s), the seller shall notify the agent of such a state change(s) and the agent shall acknowledge receipt of the same and verify that it has made the same state change in its IT Systems.
Rule 071:Where a seller uses a regulator and interchanges personal information pertaining to a business transaction, the seller shall ensure that the regulator in its IT Systems supports applicable records retention and disposal scheduling of that personal information.
Guideline 071G1:A seller can ensure that records retention and disposal requirements pertaining to personal information of a individual in a business transaction are maintained by the regulator(s) through the use of state changes.
For example, when the seller destroys, i.e., expunges the personal information as required pertaining to a specified business transaction, the seller could send a state change whereby as the SCs (and IBs) pertaining to that business transaction would be changed in their content value to “000”.
It is assumed that a regulator is involved in EDI pertaining to a business transaction due to applicable external constraints which require some or all of the SRIs pertaining to the business transaction to be interchanged with the regulator.
106 © ISO 2014 – All rights reserved
439
3690
36913692369336943695369636973698
3699370037013702370337043705370637073708370937103711371237133714371537163717
371837193720
![Page 107: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/107.jpg)
CD ISO/IEC 15944-12:2014(E)
[THIS PAGE INTENTIONALLY LEFT BLANK]
© ISO 2014 – All rights reserved 107
441
3721
3722
3723
3724
3725
3726
![Page 108: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/108.jpg)
CD ISO/IEC 15944-12:2014(E)
9 Data conversion, data migration, and data synchronization79
Project Co-Editors” Note:
1. This Clause has been added. It may require added text and rules, guidelines, etc. CD ballot comments are welcome.
2. A differentiation is made between (1) “data conversion which deals with/focuses on changes to the “format” and “representation” of the content of an SRI; and, (2) “data migration” which deals with/focuses on changes to the medium of recording, IT system (but not the application software).. Further “data synchronization” is included here but could be placed in another Clause or be made a Clause on its own.
9.1 Introduction
One characteristic of information and communication technologies (ITC) is that many of its components have a relatively short life cycle. Examples include system upgrades, new and different software, data storage devices, data processing approaches, communication devices and protocols, etc. As such it is not an uncommon occurrence that during the lifetime of a business transaction, especially where a business transaction covers several years (including post-actualization), that the organization, in the role of seller, undertakes a data conversion of its recorded information. Similarly during the life time of the recorded information pertaining to a business transaction, it may well happen that the organization undertakes an IT systems upgrade, migration to another IT system, etc., one result being a “data migration”. In either case, it is essential that all ILCM requirements are maintained and in particular those pertaining to personal information.
It is also necessary to ensure “data synchronization” of personal information pertaining to a business transaction, not only within all the DMAs of the IT system of the seller but also where the seller has an agent(s) or the nature of a business transaction involves the participation of .a third party (ies) among the DMAs of the seller and its agents and /or third parties.
9.2 Rules governing data conversion and data migration of personal information
It is necessary to differentiate between changes in the use of ITC by an organization which are (a) of the nature which impact .the format and/or representation of the content of the SRI(s), i.e., “data conversion”; and (b) of the nature which involve moving the SRI(s) from one IT system, data storage medium, etc., without any change to the application software used to manage and/or represent the contents of the SRIs pertaining to a business transaction.
In this context and in support of this e-business, it is necessary to differentiate between the concepts and definitions of “data conversion” and “data migration” as follows:
“data conversion:
process(es) of changing data, i.e., set(s) of recorded information (SRI(s)) from one format or representation to another which maintains the authenticity, integrity, reliability and usability of the SRI(s) as well as relevant ILCM requirements, and especially those of an external constraints nature including privacy protection requirements where the data involves personal information
NOTE: A characteristics of data conversion is a change in the technology used for managing and/or representing the contents of the SRI.”
EXAMPLE: Examples include data conversion resulting from a change in text processing software (e.g. MsWord to HTML), from one database software to another, from a non-data based software to a database based software approach or vice-versa, etc.”
79 The principles and rules presented in this Clause incorporate existing requirements and long established best practices of the established in the records management and archival community with respect to microfilming standards, evidentiary requirements, etc.
108 © ISO 2014 – All rights reserved
443
3727
3728
37293730
3731373237333734
3735
373637373738373937403741374237433744
3745374637473748
3749
3750
37513752375337543755
37563757
3758
3759376037613762
37633764
376537663767
444445446
![Page 109: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/109.jpg)
CD ISO/IEC 15944-12:2014(E)
“data migration:
process(es) of moving existing data, i.e., set(s) of recorded information (SRIs) from one (storage) medium or IT system to another without changes in the application software while also maintaining the authenticity, integrity, reliability, and usability of the SRI(s) as well as relevant ILCM requirements, and especially those of an external constraints nature including privacy protection requirements where the data involves personal information
NOTE: A characteristic of data migration is that of the nature of “moving” the data from one IT system to another independent of its application system which manages the SRIs and their representation.
EXAMPLE: Examples of a data migration include the operation of a “back-up” site either by the organization itself or an agent of the organization.”
Rule 072:
Where an organization undertakes a data conversion of its SRIs pertaining to a business transaction and the SRIs contain personal information, the organization shall ensure that applicable ILCM aspects in support of privacy protection requirements are fully maintained (and carried forward)
Rule 073:Where an organization undertakes a data migration of its IT system(s) to another and the IT system contains SRIs pertaining to a business transaction and the SRIs contain personal information, the organization shall ensure that applicable ILCM aspects in support of privacy protection requirements are fully maintained (and carried forward).
Rule 074:
Whenever an organization undertakes a data conversion or a data migration, it shall maintain the authenticity, integrity, reliability and usability of the SRI(s) as well as relevant ILCM requirements, and especially those of an external constraints nature including privacy protection requirements where the SRIs are of the nature of personal information
Rule 075:
Whenever an organization undertakes a data conversion or a data migration, it shall maintain an audit log/audit trail whose purpose is to provide proof and evidence that the processes involved maintain the authenticity, integrity, and reliability of the contents of the SRIs and in particular those which are of the nature of personal information
Rule 076:
Whenever an organization plans to undertake a data conversion or a data migration pertaining to SRIs which contain personal information, it shall inform its Privacy Protection Officer (PPO) and request its PPO to review and assess whether such data conversion or data migration plans, processes, audit trails/logs, etc., comply with and support applicable privacy protection requirements.
9.3 Rules governing requirements for data synchronization of personal information
The need to ensure “data synchronization” for the Information Bundles (IBs) (and their Semantic Components (SC)) interchanged among Open-edi parties to business transaction has always been assumed, (as it is fundamental and logical conclusion of the application of the six fundamental characteristics of Open-edi, especially from a BOV perspective). Data synchronization is the process of establishing consistency of the content value of any SRI from the source IT system to and among any and all other IT systems , and vice-versa, through ensuring continuous harmonization of data over time, i.e., whenever a state change occurs.
© ISO 2014 – All rights reserved 109
448
3768
3769
37703771377237733774
37753776
37773778
3779
378037813782
37833784378537863787
3788
3789379037913792
3793
3794379537963797
3798
3799380038013802
3803
3804
380538063807380838093810
![Page 110: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/110.jpg)
CD ISO/IEC 15944-12:2014(E)
Within IT systems of an organization, data synchronization can involve a number of tools such as “file synchronization”, “version control”, synchronized distributed systems, mirror computing and back-ups., etc., as well as timestamp synchronization, where all state changes to the content value are marked with time stamps. Data synchronization needs to be well designed and managed in order to prevent “sprawl” of data, ensure that security safeguards are in place, etc.
Not only is ensuring data synchronization among the IT systems of Open-edi parties participating in an business transaction, very important from both a BOV and FSV requirements perspective, where the buyer is an individual, privacy protection requirements make it mandatory.80
Rule 077:
Where the buyer in a business transaction is an individual, an the seller in its IT system uses more than one DMA (or IT systems) to process the SPIs pertaining to the instantiation of the business transaction, the seller shall ensure complete data synchronization among all such DMAs (and their IT system) including those of a back-up nature
Rule 078:
Where Rule 077 applies, and the seller uses an agent, and/or a third party, the seller shall ensure that data synchronization exists, or is enacted, prior to any EDI of SPIs with such parties
Guideline 077G1:
A seller should make data synchronization capabilities for SPIs, as stated in Rules 077 & 078, a pre-condition as part of a contractual agreement before engaging in EDI with any agent, and/or third party with respect to SPIs pertaining to a business transaction.
80 Privacy protection requirements are but one set of information law requiring data synchronization among all parties to a business transaction, Consumer protection law has requirements which are similar in nature. In addition, the nature of the particular good, service, and/or right, which is the goal of the business transaction will also invoke other external constraints, i.e., as based on applicable laws or regulations.
110 © ISO 2014 – All rights reserved
450
38113812381338143815
381638173818
3819
3820382138223823
3824
38253826
3827
382838293830
3831
3832
3833
451452453454
![Page 111: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/111.jpg)
CD ISO/IEC 15944-12:2014(E)
10 Conformance statement81
10.1 Introduction
The first two types of conformance statements presented in Clause 10 below are at the most primitive level. More detailed conformance statement(s) with associated rules and procedures, including those pertaining to verification are expected to be developed either as Addendum(s) to this 1st edition or as part of the development of a 2nd edition for this part of ISO/IEC 15944.
Clause 10 is modelled on that found in Clause 6 in the 3rd edition for ISO/IEC 14662.
There are two different categories of conformance statements for this part of ISO/IEC 15944; namely:
(a) Category A – ISO/IEC 14662 Open-edi Reference Model; and, ISO/IEC 15944 compliance; and,
(b) Category B – ISO/IEC 15944-12 conformance only. These basically apply for use by a seller or regulator.
The reason for these two categories is to permit users and implementers of ISO/IEC 15944-8 to be conformant to its requirements without using the Open-edi modelling constructs as well as registration of Open-edi scenarios and scenario components as re-usable business objects.
In addition, there are conformance statements for sue by “agents” and “third parties”. {See further Clause 10.4 below}
10.2 Conformance to the ISO/IEC 14662 Open-edi Reference Model and the multipart ISO/IEC 15944 eBusiness standard
Any user/implementer conformance statement of this nature shall state:
(a) that it is conformant to the BOV class of standards of ISO/IEC 14662;
(b) the list of the basic concepts of the ISO/IEC Open-edi Reference Model and ISO/IEC eBusiness (BOV standards) as stated in the ISO/IEC 15944-7 eBusiness Vocabulary; and,
(c) whether or not it has any Open-edi compliant scenarios and scenario components registered using ISO/IEC 15944-2.
10.3 Conformance to ISO/IEC 15944-12
Any user/implementer conformance statement of this nature shall state:
“The existence, management, use, and/or interchange of personal information, i.e., as SPIs, by XYZ [insert name of organization or public administration] with any other party (to the business transaction) is conformant and consistent with the eleven Privacy Protection principles and associated information life cycle management (ILCM) requirements as stated in ISO/IEC 15944-12 definitions, its concepts, rules, guidelines and related requirements”.
10.4 Conformance by agents and third parties to ISO/IEC 15944-12
It is the seller in a business transaction who is responsible for ILCM of personal information pertaining to a business transaction where the buyer is an individual.
81 Similar to that of Clause 13, Part 8 but with added sub-clauses re: conformance statement for “agent”, “third party”, and “regulator”.
© ISO 2014 – All rights reserved 111
456
3834
3835
3836383738383839
3840
3841
3842
3843
384438453846
38473848
38493850
3851
3852
38533854
38553856
3857
3858
38593860386138623863
3864
38653866
457458
459
![Page 112: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/112.jpg)
CD ISO/IEC 15944-12:2014(E)
This means that such personal information maintained under the control of the organization acting in the role of seller, including as ILLCM of the organizations’ IT Systems (and related DMAs). Where and when a (seller) organization decides to use an agent or a third party in the fulfillment of a business transaction containing personal information, the seller organization shall ensure that any agent or third party with which it interchanges personal information is “conformant” with ISO/IEC 15944-12.
Rule nnn:An organization, in the role of seller, in a business transaction where the buyer is an individual and the business transaction contains personal information, the organization shall ensure that before interchanges of any such personal information the agent or third party that such an agent or third party is conformant with applicable privacy protection requirements.
Conformance statement for use by parties who function as agents or third parties to a seller organization in a business transaction where the buyer is an individual and the business transaction involves personal information.
“Organization “XYZ” [insert name of organization] acting as an agent or third party [indicate which] to organization “ABC” [insert name of organization of the seller in a business transaction] hereby states that it is conformant in its IT systems with respect to the content value(s) of any and all SPIs pertaining any EDI of such SPIs with the eleven Privacy Protection principles and associated information life cycle management (ILCM) requirements as stated as in ISO/IEC 15944-12 definitions, its concepts, rules, and related requirements”.
112 © ISO 2014 – All rights reserved
461
38673868386938703871
3872387338743875387638773878387938803881388238833884388538863887
3888
![Page 113: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/113.jpg)
CD ISO/IEC 15944-12:2014(E)
Annex A(normative)
Consolidated list of terms and definitions with cultural adaptability: ISO English and ISO French language equivalency
[similar to Annex A, of Part 8, 9 and 20, i.e., only for added new definitions and terms]
A.1 Introduction
This part of ISO/IEC 15944 maximizes the use of existing standards where and whenever possible including relevant and applicable existing terms and definitions. These are presented in Clause 3 above. This Annex A contains only those new concepts and their definitions introduced in this part of ISO/IEC 15944, i.e. as ISO English and ISO French language HIEs.
The ISO/IEC 15944-7 “eBusiness Vocabulary” (a “freely available ISO standard”) in its normative Annex E already contains the consolidated ISO English and ISO French language equivalents for all the other concepts and definitions found in Clause 3 of this document ISO/IEC 15944-7 also contains ISO Russian and ISO Chinese langue HIEs for all the concepts and their definitions. It is anticipated that the contents of Annex A.5 below will serve as the basis for an Addendum to ISO/IEC 15944-7 and that this Addendum will also contain the ISO Russian and ISO Chinese HIEs for the contents of Annex A.5 below.
A.2 ISO English and ISO French
This part of ISO/IEC 15944 recognizes that the use of English and French as natural languages is not uniform or harmonized globally. (Other examples include use of Arabic, German, Portuguese, Russian, Spanish, etc., as natural languages in various jurisdictional domains).
Consequently, the terms "ISO English" and "ISO French" are used here to indicate the ISO's specialized use of English and French as natural languages in the specific context of international standardization, i.e., as a "special language".
A.3 Cultural adaptability and quality control
ISO/IEC JTC1 has "cultural adaptability" as the third strategic direction which all standards development work should support. The two other existing strategic directions are "portability" and "interoperability". Not all ISO/IEC JTC1 standards are being provided in more than one language, i.e., in addition to "ISO English," in part due to resource constraints.
Terms and definitions are an essential part of a standard. This Annex serves to support the "cultural adaptability" aspects of standards as required by ISO/IEC JTC1. Its purpose is to ensure that if, for whatever reason, an ISO/IEC JTC1 standard is developed in one ISO/IEC "official" language only, at the minimum the terms and definitions are made available in more than one language.82
A key benefit of translating terms and definitions is that such work in providing bilingual/multilingual equivalency:
should be considered a "quality control check" in that establishing an equivalency in another language ferrets out "hidden" ambiguities in the source language. Often it is only in the translation that
82 Other ISO/IEC member bodies are encouraged to provide bilingual/multilingual equivalencies of terms/definitions for the language(s) in use in their countries.
© ISO 2014 – All rights reserved 113
463
38893890389138923893
3894
3895
3896389738983899
390039013902390339043905
3906
390739083909
391039113912
3913
3914391539163917
3918391939203921
39223923
39243925
464465
![Page 114: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/114.jpg)
CD ISO/IEC 15944-12:2014(E)
ambiguities in the meaning, i.e., semantics, of the term/definition are discovered. Ensuring bilingual/multilingual equivalency of terms/definition should thus be considered akin to a minimum "ISO 9000-like" quality control check; and,
is considered a key element in the widespread adoption and use of standards world-wide, especially by users of this part of ISO/IEC 15944 who include those in various industry sectors, within a legal perspective, policy makers and consumer representatives, other standards developers, IT hardware and service providers, etc.
A.4 Organization of Annex A – Consolidated list in matrix form
The terms/definitions are organized in matrix form in alphabetical order (English language). The columns in the matrix are as follows:
Table A.1 — Columns in Table A.2Col. No. Use
IT-Interface – Identification
1 Clause 3 ID (ID definition as per ISO/IEC 15944-12 Clause 3)
2 Source. International standard referenced or that of ISO/IEC 15944-12 itself.
Human Interface Equivalent (HIE) Components
3 ISO English Language – Term
4 Gender of ISO English Language Term+
5 ISO English Language – Definition
6 ISO French Language - Term *
7 Gender of the ISO French language Term+
8 ISO French Language - Definition
The primary reason for organizing the columns in this order is to facilitate the addition of equivalent terms/definitions in other languages as added sets of paired columns, (e.g., Spanish, Japanese, German, Russian, Chinese, etc)83.
+ The codes representing gender of terms in natural languages are those found in Clause 6.2.6 in ISO/IEC 15944-5 “Gender and official, languages”, and Table 1 – “ISO/IEC 15944-5:01 Codes representing grammatical gender in natural languages”;
ISO English, in Column 4, the gender code = “99” since the English language does not have gender in its grammar; and,
ISO French, in Column 7, the gender codes are 01 = masculine, 02 = feminine and 03 = neuter
* The use of [French language equivalent required] in Colum (8) means that for these terms and definitions, ISO/IEC 20016-1 itself will be providing the ISO French language equivalent before the FDIS stage.
83 See further Part 7 “eBusiness Vocabulary” of ISO/IEC 15944 for an implementation of this approach.
114 © ISO 2014 – All rights reserved
467
392639273928
3929393039313932
3933
39343935
3936
3937
393839393940
394139423943
39443945
3946
39473948
468
![Page 115: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/115.jpg)
CD ISO/IEC 15944-12:2014(E)
A.5 List of added Part 12 terms and definitions with cultural adaptability: ISO English and ISO French
The following Table A.2 contains entries for those definitions and terms found in Clause 3 which are new tothe existing set of ISO/IEC 14662 Open-edi and the multipart series of ISO/IEC 15944 e-Business family of standards. This is because Part 7 of ISO/IEC 15944 “..eBusiness Vocabulary” already contains all the concept/definitions and associated terms ofound in the existing ISO/IEC 14662 standard and ISO/IEC 15944 family of standards, i..e, and with their ISO English, ISO French, ISO Russian and ISO Chinese equivalents.
Table A.2 — List of added Part 12 terms and definitions with cultural adaptability of: ISO English and ISO French language equivalency
IT-Interface Human Interface Equivalent (HIE) Components
Identification ISO English ISO French
eBus. Vocab.
ID
SourceRef. ID
Term G Definition Term G Definition
(1) (2) (3) (4) (5) (6) (7) (8)
DXXX ISO/IEC 15944-12 :2014 (3.5)
audit trail 99 chronological record of IT system activities that is sufficient to enable the reconstruction, reviewing and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event pertaining to sets of recorded information (SRIs) in a business transaction through all its processes, i.e., from planning to the end of post-actualization
DXXX ISO/IEC 15944-12 :2014 (3.8)
back-up copy 99 copy that is any of the following: a) additional resource or duplicate copy of data on different a storage medium stored off-line for emergency purposes; b) disk, tape or other machine-readable copy of a data or program file; c) data or program file recorded and stored off-line for emergency or archival purposes; d) record that preserves the evidence and information it contains if the original is not available
© ISO 2014 – All rights reserved 115
470
3949
39503951
39523953395439553956395739583959
![Page 116: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/116.jpg)
CD ISO/IEC 15944-12:2014(E)
IT-Interface Human Interface Equivalent (HIE) Components
Identification ISO English ISO French
eBus. Vocab.
ID
SourceRef. ID
Term G Definition Term G Definition
(1) (2) (3) (4) (5) (6) (7) (8)
DXXX ISO/IEC 15944-12 :2014 (3.33)
data conversion
99 process(es) of changing data, i.e., set(s) of recorded information (SRI(s)) from one format or representation to another which maintains the authenticity, integrity, reliability and useability of the SRI(s) as well as relevant ILCM requirements, and especially those of an external constraints nature including privacy protection requirements where the data involves personal information
NOTE: A characteristics of data conversion is a change in the technology used for managing and/or representing the contents of the SRI.”.
EXAMPLE: Examples include data conversion resulting from a change in text processing software (e.g. MsWord to HTML), from one database software to another, from a non-data based software to a database based software approach or vice-versa, etc
DXXX ISO/IEC 15944-12 :2014 (3.36)
data migration
99 moving sets of recorded information from one IT System or device to another, as required by changes in an IT System configuration or as requested by the user, while assuring that the data will remain
116 © ISO 2014 – All rights reserved
472
![Page 117: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/117.jpg)
CD ISO/IEC 15944-12:2014(E)
IT-Interface Human Interface Equivalent (HIE) Components
Identification ISO English ISO French
eBus. Vocab.
ID
SourceRef. ID
Term G Definition Term G Definition
(1) (2) (3) (4) (5) (6) (7) (8)
addressable and that data integrity will be maintained in the new environment
DXXX ISO/IEC 15944-12 :2014 (3.39)
data synchronization (in business transaction)
99 process of continuous harmonization of a set(s) of recorded information among all the parties to a business transaction to ensure that the content value(s) of the current state of such a set(s) of recorded information is the same in the IT systems of all the participating parties
NOTE Adapted from GS1 Global Traceability Standard (GDSN) Glossary.
DXXX ISO/IEC 15944-12 :2014 (3.48)
electronic signature
99 signature that consists of one or more letters, characters, numbers or other symbols in digital form incorporated in, attached to or associated with a particular digital/electronic set of recorded information (SRI)
NOTE Adapted from PIPEDA, Part 2, section 31(1); CAN/CGSB-72.34-2005, 3.28.
DXXX ISO/IEC 15944-12 :2014 (3.62)
individual anonymity
99 state of not knowing the identity or not having any recording of personal information on or about an individual as a buyer by the seller or regulator, (or any other party) to a business transaction
© ISO 2014 – All rights reserved 117
474
![Page 118: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/118.jpg)
CD ISO/IEC 15944-12:2014(E)
IT-Interface Human Interface Equivalent (HIE) Components
Identification ISO English ISO French
eBus. Vocab.
ID
SourceRef. ID
Term G Definition Term G Definition
(1) (2) (3) (4) (5) (6) (7) (8)
DXXX ISO/IEC 15944-12 :2014 (3.63)
individual authentication
99 provision of the assurance of a recognized individual identity (rii) sufficient for the purpose of the business transaction
DXXX ISO/IEC 15944-12 :2014 (3.148)
set of personal information (SPI)
99 set of recorded information (SRI) which is of the nature of or contains personal information
DXXX ISO/IEC 15944-12 :2014 (3.152)
SRI destruction
99 process of eliminating or deleting sets of recorded information, beyond any possible reconstruction
DXXX ISO/IEC 15944-12 :2014 (3.153)
SRI expungement
99 process of eliminating completely, wiping out, destroying or obliterating completely a physical or (electronic) digital set of recorded information (SRI) without so that there can be no reconstruction
DXXX ISO/IEC 15944-12 :2014 (3.154)
SRI integrity 99 (of records) reliability and trustworthiness of SRIs as copies, duplicates or comparable representations of SRIs; and reliability and trustworthiness of the IT system in which it was recorded or stored to produce reliable and trustworthy copies and duplicates of SRIs
NOTE 1 SRI integrity is important in the electronic records provisions of the evidence acts in the phrases “the integrity of the electronic records system” and “the integrity of the electronic
118 © ISO 2014 – All rights reserved
476
![Page 119: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/119.jpg)
CD ISO/IEC 15944-12:2014(E)
IT-Interface Human Interface Equivalent (HIE) Components
Identification ISO English ISO French
eBus. Vocab.
ID
SourceRef. ID
Term G Definition Term G Definition
(1) (2) (3) (4) (5) (6) (7) (8)
record.” However, the term integrity is not defined. In the absence of a statutory or judicially created definition, the principles of this standard shall serve as an operational definition of the word integrity used in the evidence acts.
NOTE 2 Certain evidence acts provide that the integrity of the electronic record may be proved by evidence of reliable encryption.
DXXX ISO/IEC 15944-12 :2014 (3.155)
SRI life cycle 99 stages in the life cycle of a SRI include but are not limited to its planning, creation and organization; the receipt and capture of data; the retrieval, processing, dissemination and distribution of a SRI; its storage, maintenance and protection; its archival preservation or destruction or expungement
DXXX ISO/IEC 15944-12 :2014 (3.156)
SRI migration 99 act of moving a SRI from one IT system to another Person within an organization or public administration while maintaining the authenticity, integrity, reliability and usability of the SRI
DXXX ISO/IEC 15944-12 :2014 (3.157)
SRI retention period
99 specified period of time that SRIs are kept by a Person in order to meet operational, legal, regulatory, fiscal or other requirements
© ISO 2014 – All rights reserved 119
478
![Page 120: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/120.jpg)
CD ISO/IEC 15944-12:2014(E)
IT-Interface Human Interface Equivalent (HIE) Components
Identification ISO English ISO French
eBus. Vocab.
ID
SourceRef. ID
Term G Definition Term G Definition
(1) (2) (3) (4) (5) (6) (7) (8)
DXXX ISO/IEC 15944-12 :2014 (3.162)
transitory record
99 SRI that is required only for a very limited and specified (retention period) time to ensure the completion of a routine action or the preparation of a subsequent SRI
NOTE A transitory SRI is expunged at the end of a short existence.
The primary reason for organizing the columns in this order is to facilitate the addition of equivalent terms/definitions in other languages as added sets of paired columns, (e.g., Spanish, Japanese, German, Russian, Chinese, etc)84.
+ The codes representing gender of terms in natural languages are those found in Clause 6.2.6 in ISO/IEC 15944-5 “Gender, and official, de facto, or LRL languages”, and especially its Table 1 – “ISO/IEC 15944-5:01 “Codes representing gender and official languages”.
84 See further ISO/IEC 15944-7 “eBusiness Vocabulary” of ISO/IEC 15944 for an implementation of this approach.
120 © ISO 2014 – All rights reserved
480
3960
3961
3962
396339643965
396639673968
481
![Page 121: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/121.jpg)
CD ISO/IEC 15944-12:2014(E)
Annex B(normative)
Consolidated set of rules in existing Parts of ISO/IEC 15944 of particular relevance to privacy protection requirements as external constraints on business transactions which apply to personal information in an ILCM
requirements context
[similar in nature to Annex B, Part 8]
B.1 Introduction
This part of ISO/IEC 15944 already makes extensive use of relevant rules and guidelines as found in referenced Clauses in ISO/IEC 15944-1 and adapts them in a privacy protection requirements context. Similarly relevant rules and guidelines found in ISO/IEC 15944-2, ISO/IEC 15944-4, and ISO/IEC 15944-5 have been adapted or serve as the basis for rules of this nature required to support privacy protection requirements.
The purpose of Annex B is to provide a consolidated presentation of all the rules in the existing parts of ISO/IEC 15944 for the scoping and specification of Open-edi scenarios and their components which pertain to external constraints relevant to privacy protection requirements. Jurisdictional domains are the primary source of external constraints. The existing parts of ISO/IEC 15944 address, in an integrated manner, the already many of the requirements arising pertaining to specifying common external constraints of jurisdictional domains which are relevant to privacy protection requirements either in a generic or specific manner.
Only the Rules themselves are presented here. For related text, as well as associated Guidelines, where applicable, see the relevant Clauses in the current editions of Parts of ISO/IEC 15944 identified in the matrixes below.
Also there are parts of ISO/IEC 15944 which do not contain any rules (or guidelines) of relevance to privacy protection requirements. These are:
1) ISO/IEC 15944-4
The primary reason for this is that ISO/IEC 15944-4 focuses on “accounting and economic ontology” at the Person level as parties to a business transaction, i.e., in their roles as buyers, sellers, and/or regulators.
2) ISO/IEC 15944-6
ISO/IEC 15944-6 is of the nature of an ISO/IEC “technical report (TR)” providing a “Technical Introduction to e-Business Modelling. As such, it contains no rules.
B.2 Organization of Annex B: Consolidated list in matrix form
The rules and associated references are presented in matrix form. The rules are presented in the numeric order in which they are presented in ISO/IEC 15944-1. The columns in the matrix are as follows:
© ISO 2014 – All rights reserved 121
483
3969397039713972397339743975
3976
3977
39783979398039813982
3983398439853986398739883989
399039913992
39933994
3995
39963997
3998
39994000
4001
40024003
4004
4005
![Page 122: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/122.jpg)
CD ISO/IEC 15944-12:2014(E)
Col. No Use
1 Number of Rule as per ISO/IEC 15944-1.
2 Clause ID in ISO/IEC 15944-1 of which the Rule is part
3 Rule Statement as per ISO/IEC 15944-1
Note: Only text of the Rule itself is presented. For associated guidelines, requirements and text see the relevant clauses in that part of ISO/IEC 15944. All Parts of ISO/IEC 15944 are ISO “freely available standards”.
B.3 Consolidated list of rules in ISO/IEC 15944-1 pertaining to external constraints relevant to supporting privacy protection requirements
Rule No. Clause ID Rule Statement
(1) (2) (3)
3 6.1.3 In (electronic) business transactions, all commitments shall be stated explicitly and unambiguously and be understood by all Persons involved in a business transaction.
13 6.2.2 The level of unambiguity, i.e., certainty/reliability of a persona and resulting identification of the Person identity used by a Person shall be appropriate to the goal of the business transaction.
15 6.2.2 Business transactions having different goals may allow a Person to use the same persona and its associated identification schema (including resulting identifiers), while others may prohibit this.
27 6.2.4 Unless bound by external constraints, "buyers" and "sellers" as Persons are free to undertake any business transaction involving any good, service, and/or right they mutually agree to.
28 6.2.4 External constraints governing rules and practices of "buyers" and "sellers" in business transactions apply either to Persons (undifferentiated) or distinguish among "individuals", "organizations", and "public administrations".
29 6.2.5 Rights or obligations arising from commitments in a business transaction shall be fulfilled either directly by the Person as the end entity or by an agent acting on its behalf.
30 6.2.5 The ability to delegate a role to an agent shall be explicitly stated. If constraints must be satisfied before such delegation can take place they shall be explicitly stated.
31 6.2.5 Where delegation of a role cannot take place this shall be explicitly stated.
32 6.2.5 A business transaction takes place between two Persons. Other Persons, i.e., third parties, may fulfil specified role(s) or functions(s) on mutual agreement or as a result of external constraints.
122 © ISO 2014 – All rights reserved
485
4006
4007
40084009
![Page 123: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/123.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
33 6.2.6 External constraints exist on the provisioning of goods and services and the behaviour of Persons as players in business transactions including those provided via electronic commerce.
34 6.2.7 From a minimal external constraints perspective, the three basic sub-types of Persons as role players in any business scenario are:
A. individual,
B. organization, and
C. public administration.
35 6.2.7 A legal (or artificial) Person consists of one or more natural persons and/or one or more other legal persons. A unifying term and common concept used internationally is the standard term "organization" as the collective common term for all the different ways legal (or artificial) persons can be composed and be recognized in various jurisdictions.
38 6.2.8 From a minimal external constraints perspective, a common set of constraints on a business transaction where the buyer is an individual are those of a consumer protection nature.
39 6.3.1 Conceptually a business transaction can be considered to be constructed from a set of fundamental activities. They are planning, identification, negotiation, actualization and post-actualization.
40 6.3.1 The five fundamental activities may take place in any order.
44 6.4.1 Electronic business transactions require "recorded information".
47 6.4.2 The definition of "data", and related information technology terms and definitions found in this part of ISO/IEC 15944 shall able to be mapped into legal frameworks.
48 6.4.2 Standards development work in support of electronic business transactions shall incorporate and support data granularity requirements. The level of granularity reflects the degree of detail appropriate to the level of certainty required in the data being interchanged among the parties participating in a business transaction.
49 6.5.1 Open-edi scenarios and Information Bundles shall therefore be capable of reflecting constraints to be applied which may be as a result of:
- commitments among parties, i.e., as internal constraints;
- external constraints.
50 7.2 The requirement for an Open-edi scenario to incorporate external constraints on a business transaction shall be stated at the outset.
51 7.2 It is necessary to state whether the Open-edi Parties in the business transaction being modelled are (a) Persons in general, i.e., undifferentiated; or (b) differentiated among categories of Persons, i.e., subtypes, as individuals, organizations and public administration.
© ISO 2014 – All rights reserved 123
487
![Page 124: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/124.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
57 7.2 If the business transaction being modelled through an Open-edi scenario incorporates external constraints which impact FSV demands on Open-edi Support Infrastructure (OeSI), these shall be specified.
66 8.3.2.4 The set of Roles applicable to the scenario shall be specified and referenced through their Role Identifiers.
67 8.3.2.4 One shall state which roles are mandatory, conditional, or mandatory subject to a conditional.
68 8.3.2.4 Where applicable, constraints on the same Open-edi Party playing more than one of the roles in the set of roles applicable to the OeS shall be specified
70 8.3.2.5 If applicable, one should state which IBs are mandatory, conditional, or mandatory subject to a conditional.
71 8.3.2.5 Where applicable, constraints on IBs pertaining to roles in the OeS shall be specified.
72 8.3.2.6 The business requirements, rules and practices applicable at the scenario level shall be specified. This specification shall be stated at a level of detail to ensure that there is no ambiguity in the commitments among Open-edi Parties at the scenario level.
73 8.3.2.6 Business constraints, if any at the scenario level, pertaining to Open-edi Parties and scenario components shall be specified. All of these shall be accounted for in scenario components, i.e., roles and/or Information Bundles.
74 8.3.2.7 Requirements or constraints arising from applicable laws or regulations at the scenario level shall be explicitly stated including the source jurisdictions.
75 8.3.2.7 Where multiple laws and regulations apply at the scenario level, the constraints applicable shall be integrated.
101 8.4.2.5 Constraints, if any, on an Open-edi Party being able to play a role shall be specified.
103 8.4.2.7 Any external constraints arising from laws or regulations to any aspect of the role and its attributes shall be identified and stated including the reference/source of the applicable law or regulation, i.e., qualifications for a role, prescribed behaviour, restrictions on the delegation of a role, etc.
135 8.5.2.4 Any business rules controlling content of an IB shall be identified and the nature and functioning of these rules explicitly stated. The source of such business rules shall also be referenced.
136 8.5.2.5 Any external constraints arising from laws and regulations governing the content of an IB shall be identified, the requirements explicitly stated and the source referenced.
137 8.5.2.5 Any IB created to meet a requirement of external constraints of the nature of laws and regulations should be so identified, the contents of the IB explicitly defined, at the level of granularity required, and the source law/regulation referenced.
140 8.5.2.8 Requirements for retention of recorded information for an IB, if any, shall be
124 © ISO 2014 – All rights reserved
489
![Page 125: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/125.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
specified as well as which OePs involved in the associated role(s) have the primary responsibility for retaining this recorded information
141 8.5.2.9 Requirements arising from laws or regulations for the retention of recorded information applicable to the IB, if any, shall be explicitly stated and the source(s) referenced.
146 8.5.5.1 A Semantic Component can be a single (simple) data element, a composite data element, or a data structure, (e.g., a set of data elements which interwork in order to ensure semantic completeness and ensure the required unambiguousness).
147 8.5.5.1 A Semantic Component shall be a component of at least one Information Bundle when exchanged among Open-edi Parties.
153 8.5.5.2.2 A SC name is the designation of the SC ID by a linguistic expression. More than one SC name as equivalent linguistic expressions may be associated with an SC ID, (e.g., as "aliases").
B.4 Consolidated list of rules in ISO/IEC 15944-2 pertaining to external constraints of relevance to supporting privacy protection requirements
Rule No. Clause ID Rule Statement
(1) (2) (3)
2 5.3 The registration of any scenario or scenario component shall be capable of supporting multilingual semantic equivalents at the human interface.
3 5.3 On the while, and from an internal constraints only based perspective, parties to a business transaction are free to choose the language(s) to be used.
9 6.5 Only valid, superseded, and retired OeRIs shall be exposed when the contents of a register are made available to the public.
B.5 Consolidated list of rules in ISO/IEC 15944-5 pertaining to external constraints of relevance to supporting privacy protection requirements
Rule No. Clause ID Rule Statement
(1) (2) (3)
002 5.2.1 Unless a particular external constraint governing the commitment made requires that it be made in a specific jurisdictional domain, Persons are free to choose the jurisdictional domain in which the business transaction is (deemed) to take place
003 5.2.3 Depending on the nature of the goods, services or rights being provided (as the goal of the business transaction being modelled), applicable external constraints may specify and require the transaction to be enacted in a specified jurisdictional
© ISO 2014 – All rights reserved 125
491
4010
40114012
4013
40144015
![Page 126: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/126.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
domain
004 5.2.3 Within a particular jurisdictional domain, it may be required to reference a specific act or regulation as well as require the participation (in some form) of a regulator.
005 5.2.3 For any business transaction (or part thereof) which involves external constraint(s), the role of regulator(s) shall be included and modelled as part of the scenario and scenario components.
006 5.3 The primary source of a regulator having the authority to prescribe external constraints is that of the nature of a jurisdictional domain.
008 5.4 When modelling a business transaction, where one includes external constraints, it is necessary to differentiate among the three common sub-types of Person, namely "individual", "organization" and "public administration". A jurisdictional domain shall be modelled as a "public administration".
016 5.7 An external constraint may specify the "explicitly shared goal" of a business transaction as a whole.
017 6.2.1 It is vital that all parties to a business transaction have a complete and unambiguous understanding, i.e., level of certainty and explicitness required, to ensure that the commitments being entered into are fully and completely understood and agreed upon by all the parties involved.
018 6.2.1 Persons, whether as “individuals” or as “organization Persons” acting on behalf of their organization or public administration (on whose behalf they are qualified and authorized as role players to make commitments), must agree to the language(s) to be utilized in a business transaction, i.e., by all the parties involved, in order to ensure that the semantics of the commitments being entered into are completely understood by all parties involved.
019 6.2.1 Choice of use of language(s) is governed by three primary factors:
(1) seller, i.e., supplier choice;
(2) buyer, i.e., user, demands; and/or;
(3) regulator, i.e., requirements of a jurisdictional domain.
020 6.2.1 In business transactions which are modelled and registered as scenarios and scenario components which involve internal constraints only, the parties involved are free to choose and decide among themselves the natural language(s) to be used for the recorded information in a business transaction.
021 6.2.1 In modelling a business transaction which involves internal constraints only, it is advisable that parties concerned use the 3-alpha language code(s) as stated in ISO 639-2/T code set for the identification of the language(s) to be used and/or supported.
022 6.2.2 In business transactions which are modelled (and registered) as scenarios and scenario components, i.e., as business objects, which involve external constraints, one shall specify the official language(s) to be supported based on the requirements of the jurisdictional domain(s) which is the source(s) for these external constraints.
126 © ISO 2014 – All rights reserved
493
![Page 127: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/127.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
023 6.2.2 In modelling a business transaction (or parts thereof) and registering them as re-useable business objects involving external constraints, these shall be modelled in a manner which supports the language requirements, including a multilingual approach, of the source of such external constraint(s), (e.g., jurisdictional domain(s)).
024 6.2.2 A jurisdictional domain has either an official language(s) or a de facto language.
025 6.2.2 It is for a jurisdictional domain to decide whether or not it has an official language. If not, it will have a de facto language.
026 6.2.2 A law or regulation of a jurisdictional domain may require the use of or the ability to support a specific language within a particular context, i.e., as a “legally recognized language (LRN)”.
027 6.2.3 Where a jurisdictional domain has more than one official language, Persons as suppliers shall be capable of communicating with buyers (particularly as individuals) in any one of the official languages of that jurisdictional domain.
028 6.2.4 A jurisdictional domain may have either one or more official languages and, if not, may have only one “de facto language”.
029 6.2.6 In order to be able to specify the gender of a noun or term used as may be required based on the official (or de facto) language utilized, the set of "Codes Representing Gender in Natural Languages" shall be used in the modelling of a business transaction and registration of any related business object.
030 6.2.6 Where the official language (or de facto language) of a jurisdictional domain has no gender this shall be stated.
031 6.2.7 Where a jurisdictional domain has more than one official language, human interface equivalents (HIEs) are required in each official language in order to ensure unambiguity in the semantics of the commitments made.
032 6.2.7 It is up to a jurisdictional domain to establish HIEs in its official language(s) where these are part of the specification and implementation of external constraints.
033 6.2.8 In order to ensure unambiguity in the use of a natural language in business transactions it is necessary to specify the jurisdictional domain for the varied forms of that natural language to be utilized using common standard default conventions for the unambiguous identification, interworkings and referencing of combinations of codes representing countries, language and currencies.
034 6.2.8 In modelling a business transaction through scenarios and scenario components which involve external constraints and for which the Source Authority is a UN member state (or an administrative sub-division of the same), it is advisable that all parties concerned use the 3-digit numeric country code plus the 3-alpha language code, and in this order.
035 6.2.9 The official language of a treaty-based international organization recognized as having primary competence in a specific sector can override the official language requirements of the jurisdictional domains of UN member states.
036 6.2.9 In modelling a business transaction (or parts thereof) as scenarios and scenario components, and registering them as re-useable business objects involving
© ISO 2014 – All rights reserved 127
495
![Page 128: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/128.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
internal constraints, these should be modelled in a manner which supports the language(s) of the source authorities referenced and utilized in such referenced specifications.
037 6.3.2 A common set of external constraints of a jurisdictional domain on a business transaction, where the buyer is an individual, are those of a consumer protection nature.
038 6.3.2 Where the buyer is an individual, the seller shall ascertain that the individual has the age qualification required by the jurisdictional domain to be able to be involved in and make commitments pertaining to the good, service and/or right being offered in the proposed business transaction.
039 6.3.2 A seller shall ensure that where its intends to sell a good, service and/or right to a buyer as an individual that consumer protection requirements of the applicable jurisdictional domain of the buyer are supported.
040 A common set of external constraints of a jurisdictional domain on a business transaction, where the buyer is an individual, are those of a privacy protection nature.
041 6.4 When an external constraint of a jurisdictional domain requires use of a specific identification system with respect to a recognized Person identity (rPi) and/or with respect to a good, service and/or right, pertaining to the business transaction being modelled as scenarios and scenario components as re-useable business objects, such modelling shall be done in a manner which supports the requirement of the identification system referenced.
042 6.5 Where an external constraint of a jurisdictional domain requires the use of a specific classification system and the same forms part of the business transaction being modelled, or as an identifiable and registered scenario component, i.e., as a re-useable business object, this shall be done in a manner which supports the requirements of the classification system being referenced.
043 6.5 Where a classification system uses identifiers for each distinct entry, (with the associated semantics in that classification system), such identifiers (or "composite identifiers") shall be utilized as well as their structure in modelling a scenario or scenario component.
044 6.6.2.2 Any external constraint of a jurisdictional domain which governs, limits or qualifies a Person, a Person sub-type, any role qualification, etc., with respect to a business transaction of a particular nature shall be specified unambiguously and in a manner so as to be able to be modelled using an OeDT.
045 6.6.2.3 A LRN may have both a long, i.e., complete, persona, or a short, i.e., truncated, persona.
046 6.6.2.3 The formation of a LRN of an incorporated organization, i.e., a legal person, is governed by the rules of the jurisdictional domain in which it is incorporated, registered and recognized as such.
047 6.6.2.3 The establishment and representation of name(s) of a public administration, i.e., its personae, is determined by the jurisdictional domain of which it is part.
048 6.6.2.3 The personae of an individual shall include at least one LRN in order to confirm the
128 © ISO 2014 – All rights reserved
497
![Page 129: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/129.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
existence of that individual as a "natural person", i.e., the birth certificate name (or a similar name).
049 6.6.2.3 The establishment and representation of an individual, i.e., its personae, is determined by the role and context of that individual within a jurisdictional domain, i.e., as controlled by a regulator and the associated public administration.
050 6.6.3 Conceptually a business transaction can be considered to be constructed from a set of fundamental activities. They are planning, identification, negotiation, actualization and post-actualization.
051 6.6.3 The five fundamental activities may take place in any order.
052 6.6.3 A Person may terminate a business transaction by any agreed method of conclusion.
053 6.6.3 The five fundamental sets of activities may be completed in a single continuous interactive dialogue or through multiple sets of interactions among buyer and seller and possibly involve agents or third parties as well.
054 6.6.4.3 An instantiated business transaction shall have one or more IB or SC for which no state changes are permitted. One of these is to serve as the transaction ID number, i.e., a business transaction identifier (BTI), for the instantiated business transaction.
055 6.6.4.5 In the modelling of a business transaction, through a scenario and scenario components, and/or registering them as referenceable and reusable business objects, one shall specify the temporal schema, i.e., date/time referencing system, if one is utilized as well as the level of granularity supported.
056 6.6.4.5 Any calendar, date/time referenced, etc., identified and referenced shall be one based on (or linkable to) an ISO 8601 or ISO 19108 and conformant to the requirements of either one of these two standards.
057 66.4. Where the Gregorian calendar is utilized, the ISO 8601 compliant representation of
1) a date in a YYYY-MM-DD format ; and,
2) a time of day in an hh:mm:ss format ,
shall be used.
058 6.6.4.5 Where from an IT-system perspective and/or financial system needs perspective, a “GPS calendar clock” or an “atomic clock” is to be used, this shall be specified.
059 7.1 The basic rules for the formation and identification of jurisdictional domains are governed by the Charter of the United Nations and more specifically by the Vienna Convention on the Law of Treaties.
060 7.2 UN member states as peer jurisdictional domains are to be referenced by their 3-digit numeric code as stated by the UN statistical system.
061 7.2 Where the 3-digit numeric code of a UN member state is to be utilized in conjunction with, i.e. required to interwork with (1) a code representing an official (or de facto) language of that jurisdictional domain; (2) a code representing a currency recognized for use in that jurisdictional domain; and/or, (3) both (1) and
© ISO 2014 – All rights reserved 129
499
![Page 130: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/130.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
(2), one shall use the standard default conventions for the identification, interworking and referencing of combinations of codes representing countries, languages and currencies as provided in Annex D.
063 7.3.2 Two jurisdictional domains, of whatever category, can bind themselves in a bilateral treaty, to form a new common jurisdictional domain, either generally or as pertaining to a specified set of goods, services and/or rights
064 7.3.3 Three or more jurisdictional domains, of whatever category, can bind themselves via a plurilateral treaty to form a new jurisdictional domain, either generally or as pertaining to a specified set of goods, services and/or rights.
065 7.3.4 Three or more jurisdictional domains can bind themselves via a multilateral treaty to form a new jurisdictional domain either generally or as pertaining to a specified set of goods, services an/or rights.
066 7.8.2 In order to ensure unambiguous identification in referencing UN member states, the 3-digit numeric codes of the UN Statistical Division representing the UN member state shall be utilized as its primary identifier.
070 8.2 It is important in scoping an Open-edi Scenario to specify at the outset whether or not external constraints apply to the business transaction being modelled.
B.6 Consolidated list of rules in ISO/IEC 15944-7 pertaining to external constraints of relevance to supporting privacy protection requirements
ISO/IEC 15944-7 titled “…eBusiness Vocabulary” provides the ISO English and ISO French language equivalents, i.e., as HIEs, for all the definitions of concepts (and associated terms) found in the most recent editions of the ISO/IEC 14662 Open-edi Reference Model and ISO/IEC 15944-1, ISO/IEC 15944-2, ISO/IEC 15944-4, and ISO/IEC 15944-6 Business Operational View.
Although ISO/IEC 15944-7 is of the nature of a consolidated and integrated “controlled vocabulary”, it does contain rules which are relevant from a privacy protection requirements perspective. These are rules which are of the nature of supporting and assuring “unambiguity” in definitions of (key) concepts in the recorded information provided in support of a business transaction where the buyer is an individual and thus privacy protection requirements apply. These rules also support (and facilitate) the provision of HIEs in many a languages. Finally, it is a requirement that any organization or public administration (which is subject to privacy protection requirements) shall make publicly available its privacy protection policy. As such, it is advised that any definitions in an organization‘s privacy protection policy apply and implement these ISO/IEC 15944-7 rules to support and ensure “unambiguity” in any definitions as well as HIE support.
Rule No. Clause ID Rule Statement
(1) (2) (3)
001 5.2 The use of a rule-based and flexible object oriented approach for the eBusiness Vocabulary requires rigorous quality and integrity control of the definitions to ensure that there is no tautology, i.e. circularity, in the full set of concepts definedin the international standard.
002 5.2 In order to ensure a harmonized “system of concepts,” a definition for a concept
130 © ISO 2014 – All rights reserved
501
4016
40174018
4019402040214022
402340244025402640274028402940304031
![Page 131: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/131.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
shall be established as early as possible in the development of the standard.
003 5.2 A concept may be totally atomic or may consist, i.e., inherit, one or more other concepts.
004 5.2 A concept may be part of one or more other concepts.
005 5.2 The presentation for a HIE eBusiness Vocabulary shall be in a form and format as already provided in Annex D, E or F in this part of ISO/IEC 15944.
006 5.3 The set of essential elements of each entry (or record) in the eBusiness Vocabulary, for each defined concept, consists of:
(a) the definition (of the concept);
(b) the term (representing the concept);
(c) the abbreviation of the concept (as applicable);
(d) the gender code for the term;
(e) the composite identifier (for the concept); and,
(f) the internal eBusiness vocabulary identifier.
007 5.3.1 The characteristics (and their unique combination) of a (new) concept shall be identified and agreed to prior to the drafting of a definition for that concept.
008 5.3.1 In the identification of the unique combination of characteristics for a concept, one shall maximize use of those already defined in existing international standards, i.e., where and whenever applicable or relevant.
009 5.3.1 Any concept requiring a definition for the clarity of the understanding and use of the ISO/IEC JTC1 international eBusiness standards shall be included in that standard.
010 5.3.1 There must be 1) a business case and rationale for the need to introduce a (new) concept into an international standard with its resulting definition and assigned term; and, 2) such a business case and rationale must maximize re-use and integration of existing international standards, i.e. those of ISO, IEC, ISO/IEC and/or ITU.
011 5.3.1 The descriptive statement comprising a definition must be clear, explicit and unambiguous and stated in the form of a single sentence.
012 5.3.1 Only a concept with a single definition shall be included and both the definition and associated term shall be stated in the singular.
013 5.3.1 Any definition of an eBusiness concept must be developed with two or more human interface equivalencies (HIEs) in order to maximize its unambiguity and subsequent use in support of any and all commitments made among parties to a business transaction.
014 5.3.1 As stated in 5.1, a concept can consist of, i.e. inherit, one or more other concepts. Consequently, where this occurs, the definition for a concept of this nature shall explicitly support this requirement.
015 5.3.1 When a concept incorporates one or more other concepts, the terms representing
© ISO 2014 – All rights reserved 131
503
![Page 132: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/132.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
these concepts shall be included in bold in the definition for that concept.
016 5.3.2 The issue of “polysemy” shall be avoided in international standards development.
017 5.3.2 The term chosen to designate a concept and its definition shall be unambiguous and not easily confused with terms representing other concepts.
018 5.3.2 The fact that the primary use of the eBusiness Vocabulary is to support the making of commitments, it is important that the term chose to designate a concept and its definition, is unambiguous and not confused with other concepts (meanings).
019 5.3.2 A term assigned to a definition of a concept is deemed to be a “noun” (or the gerundial form of a noun like “identification”).
020 5.3.3 In the development of a definition for a concept, the committee responsible shall decide as to whether or not an abbreviation or acronym needs to be assigned to the definition of a concept in addition to the term.
021 5.3.4 The gender of each term, as a noun, in the eBusiness Vocabulary shall be specified using Coded Domain ISO/IEC 15944-5:01 “Codes Representing Gender in a Natural Language”.
022 5.3.5 The identifier of any eBusiness Vocabulary entry is of the nature of a composite identifier and shall meet the requirements of “identifier (in business transaction)”.
023 5.3.5 The eBusiness Vocabulary composite identifiers are composed of a minimum set of four discrete and mandatory data elements, consisting of:
(a) the source international standard reference for the vocabulary entry;
(b) the unique identifier assigned by international standards organization for the standards
(c) document including part number where applicable;
(d) the date of the standard document as applicable
(e) the identifier of the Clause number in the standards document referenced.
024 5.3.5 An eBusiness Vocabulary identifier, as a composite identifier is deemed to be linguistically neutral and as such will have one or more Human Interface Equivalents (HIEs) for the definitions and terms they represent.
025 5.3.6 Each eBusiness Vocabulary identifier shall be assigned an internal unique identifier (as its common pivot code) as part of its entry in Annex D of ISO/IEC 15944-7, i.e., in the form of “Dnnn”. See Annex D.
026 5.3.6 Any subsequent, i.e., new, entry to the eBusiness Vocabulary shall be assigned the next available sequential “Dnnn” number.
027 5.4 In the development of a controlled vocabulary for an international standard, or a family of international standards (e.g. as here in the field of eBusiness), one shall maximize use (re-use) of applicable concepts already defined in existing international standards.
028 5.4 Where the term assigned to a defined concept, essential to the identification and
132 © ISO 2014 – All rights reserved
505
![Page 133: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/133.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
referencing of a concept is already in use, the term shall be accompanied by the qualification, (e.g., as for “identifier (in a business transaction))”.
029 6.2 The ISO/IEC JTC1/SC32 P-member bodies working with and through their national body standards organization are responsible in their jurisdictional domains for developing the human interface equivalents (HIEs) of the term/definition of a concept into the official language(s) of that jurisdictional domain as an Annex to this part of ISO/IEC 15944.
030 6.2 Any submission by an ISO/IEC, ISO, IEC and/or ITU P-member body of an Annex of HIEs to this part of ISO/IEC 15944 shall use the template of Clause 9 to specify the criteria governing the presentation of the eBusiness Vocabulary in that language.
031 6.3 Any UN member may submit, via its National Standards body, a new Annex to this part of ISO/IEC 15944 of the eBusiness Vocabulary in the official language(s) of its jurisdictional domain.
032 6.4 It is up to each ISO/IEC JTC1 P-member (or UN member state working via its national standards body), to develop and decide on the development of the HIE definition and assignment of the associated term for each ISO concept.
033 6.4 For the definition of a concept, the ISO/IEC JTC1 P-member body (or UN member state) may use (1) a transliteration of the ISO English (or ISO French) term for that concept in one’s language(s); or, (2) one can coin a new term for that concept.
034 6.4 Where a concept also has an abbreviation for the term in ISO English (or ISO French), the ISO/IEC JTC1 P-member (or UN member state), may (1) use an existing ISO English (or ISO French) abbreviation; or (2) develop a new abbreviation in its language(s).
035 7.0 The structure and presentation of any eBusiness Vocabulary to be added in other languages, i.e., as an Annex to this part of ISO/IEC 15944, shall be considered to be a set of HIE equivalent(s) in the official language(s) of the jurisdictional domain submitting such a new Annex to this part of ISO/IEC 15944.
036 7.0 The submission of such a set of eBusiness Vocabulary entries as a new Annex to this part of ISO/IEC 15944 shall be done in conformance with the rules stated in Clause 6.
037 7.0 The structure and representation of any additional eBusiness Vocabulary as an HIE Annex to this part of ISO/IEC 15944 shall conform to one or more of the following options (or combinations thereof):
1) be only in the official language(s) of the submitting ISO/IEC JTC1 P-member body (or UN member state);
2) include an ISO official language, i.e., English, French or Russian, as part of its submission for an Annex, the equivalent language(s) of the jurisdictional domain of the ISO/IEC P-member (or UN member state);
3) where there is more than one writing system for the official language(s) of that jurisdictional domain specify the applicable writing systems.
038 7.0 In support of the above rules, any submission of the addition of a HIE version of an eBusiness Vocabulary, i.e., as an Annex to this part of ISO/IEC 15944 shall be in
© ISO 2014 – All rights reserved 133
507
![Page 134: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/134.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
one of the following formats: (1) the format as presented in Annex D of this ISO/IEC 15944-7(with either unilingual, bilingual or multilingual HIEs); or, (2) the format as per Clause 3 in ISO/IEC 15944-7 (with either unilingual, bilingual, or multilingual HIEs).
039 7.0 Where the official language(s) of an ISO/IEC JTC1 P-member (or UN member state), or any jurisdictional domain includes the use of more than one writing system for the official language(s) of that jurisdictional domain, the submitting ISO/IEC JTC1 P-member or submitting jurisdictional domain shall state in its submission, as a new Annex to ISO/IEC 15944-7 whether it: (a) submits such in only one writing system of its official language; or, (b) submits such an Annex in two (or more) writing systems for representation of its language.
040 7.0 Any structure and presentation of a HIE version of the eBusiness Vocabulary shall contain the mandatory essential elements of such a “controlled vocabulary” as stated in 5.3.
041 7.0 In addition, any eBusiness Vocabulary of a HIE nature, submitted as an added Annex, to this part of ISO/IEC 15944 shall include the,
1) its UN member 3 digit ID code for which the UN is the coded domain Source Authority (cdSA). (This 3 digit code is also repeated in ISO 3166-1);
2) the 3 alpha code(s) of its official language(s) used in the HIE version of the eBusiness Vocabulary provided. The 3 alpha code shall be one based on the ISO 639-2/T set of codes; and,
3) the Annex D entry ID number, (e.g., D125) which serves as the pivot ID code).
042 8.1 The source for any amendments or additions to the entries in the eBusiness Vocabulary as stated in Annex D of this part of ISO/IEC 15944 shall be either:
1) this part of ISO/IEC 15944 itself;
2) amendments or additions to existing eBusiness standards namely ISO/IEC 14662 or current Parts of ISO/IEC 15944 which are already international standards, i.e., ISO/IEC 15944-1, ISO/IEC 159544-2, ISO/IEC 15944-4, ISO/IEC 15944-5, ISO/IEC 15944-6, and ISO/IEC 15944-7; and/or,
3) new parts of ISO/IEC 15944 which are under development, namely: ISO/IEC 15944-3 and ISO/IEC 15944-8.
043 8.2 A repository of the eBusiness Vocabulary, as an integrated and harmonized controlled vocabulary, shall be maintained for ISO eBusiness standards. Currently, these include ISO/IEC 14662, ISO/IEC 15944-1, ISO/IEC 15944-2, ISO/IEC 15944-4, ISO/IEC 15944-5, ISO/IEC 15944-6, and ISO/IEC 15944-7 eBusiness standard (and ISO/IEC 15944-3, and ISO/IEC 15944-8 which are currently under development).
044 8.2 The eBusiness Vocabulary shall also be maintained in the form of an online computer database.
045 8.3 The form and format for referencing an eBusiness Vocabulary entry is that of
134 © ISO 2014 – All rights reserved
509
![Page 135: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/135.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
“ISO/IEC 15944-7::nnn” where the “nnn” is that of the “nnn” in the “Dnnn” entry in Annex D of ISO/IEC 15944-7.
046 8.3 The overall approach to the maintenance of entries in the eBusiness Vocabulary shall be based on and harmonized with the rules governing the maintenance of “business objects” as stated in ISO/IEC 15944-2.
047 8.4 An eBusiness Vocabulary Dnnn once assigned is deemed to be permanent and if retired shall not be re-assigned.
048 8.4 The definition in an eBusiness Vocabulary entry, in a Clause 3, which is part of more than one eBusiness standard, shall not be changed without taking into consideration the other standards in which it is also a sub-clause in Clause 3.
B.7 Consolidated list of rules in ISO/IEC 15944-8 pertaining to external constraints of relevance to supporting privacy protection requirements
Project Co-Editors’ Notes:
1. This Annex B.7 currently contains all the rules found in ISO/IEC 15944-8.
2. In the preparation of the 2nd CD/or draft DIS document for Part 12, the consolidated list of rules below will be culled so that only those of particular relevance to ILCM will remain.
Rule No. Clause ID Rule Statement
(1) (2) (3)
001 5.2 Where exceptions to the application of privacy protection principles exist, they shall be:
1) limited and proportional to meeting the objectives to which these exceptions relate; and,
2) a) made known to the public; or,
b) in accordance with law.
002 5.3.1 The protection of personal information shall be designed to prevent the misuse of such personal information.
© ISO 2014 – All rights reserved 135
511
4032
4033
4034
4035
4036
4037
40384039
4040
4041
40424043
![Page 136: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/136.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
003 5.3.2 An organization subject to privacy protection requirements in the jurisdictional domain (at whatever level) in which it delivers a good, service and/or rights, shall have in place implemented, enforceable policies and procedures with the proper accountability controls required to ensure its compliance with applicable privacy protection requirements
004 5.3.2 An organization is responsible for all personal information under its control and shall designate an organization Person, i.e. a privacy protection officer (PPO), who is accountable for the organization's compliance with established privacy principles which, in turn, are compliant with and support the legal requirements of a privacy protection nature of the applicable jurisdictional domain(s) in which the organization operates.
005 5.3.2 Any organization to which privacy protection requirements apply shall have in place policies and practices which make it clear as to who (and where), in an enforceable and auditable manner, in their business operations is responsible for compliance with these external constraints as applicable to the conduct of business transactions where the buyer is an individual.
006 5.3.2 Where an organization, as a seller, delegates any aspect of a business transaction involving an individual , and interchanges of personal information pertaining to that individual, to an “agent” (and/or “third party”), the organization shall ensure that: (1) in its arrangement with the designated agent (and/or third party), the agent (and/or third party) is fully aware of the applicable privacy protection requirements; and, (2) such parties commit themselves to support the applicable privacy protection requirements pertaining to the business transaction.
007 5.3.2 An agent (and/or third party) which commits itself to act on behalf of a Person acting as a seller in a business transaction, where the buyer is an individual in a jurisdictional domain where privacy protection requirements apply, shall ensure that the DMA(s) in its IT system(s) is capable of supporting applicable external constraints requirements.
008 5.3.2 An organization shall ensure that in the execution of an (instantiated) business transaction, i.e., as identified by its business transaction identifier (BTI), that where these involve parties, other than the individual as a buyer, that such parties, are capable of and have implemented the requirements of the privacy protection principles.
009 5.3.3 The specified purpose(s) for which personal information is collected with respect to the (the (potential) goal of the business transaction shall be identified by the organization at or before the personal information is collected.
010 5.3.4 Where in a business transaction, the seller requires the buyer, as an individual, to provide personal information, the seller shall ensure that the collection and use of such personal information shall have the informed and explicit consent of the individual and that the same be directly linked to the specified goal of the business transaction (to be) entered into.
011 5.3.4 Any secondary use of personal information of the individual in a business transaction requires the explicit and informed consent of the individual.
012 5.3.4 Except with the explicit informed consent of the individual, or as required by law, personal information shall not be used or disclosed for purposes other than those for which it was collected, i.e., in the context of the specified goal of the business
136 © ISO 2014 – All rights reserved
513
![Page 137: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/137.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
transaction to which it pertains.
013 5.3.5 The collection of personal information shall be limited to only that which is necessary and relevant for the identified and specified purpose, i.e., the goal, of the specified business transaction.
014 5.3.5 Any collection of personal information by the seller, or other parties to a business transaction, which pertains to a buyer as an individual in that business transaction, shall be lawful and fair.
015 5.3.5 An organization collecting personal information shall inform the individual concerned whether or not the personal information collected is:
1) essential to the intention of the business transaction;
2) required to be provided by the individual due to identified and specified constraints of jurisdictional domains applicable to the nature and goal of the business transaction; and/or,
3) “optional”, i.e., desired to have by the organization, acting as the seller, but not required.
016 5.3.6 The integrated set of ILCM principles applies to and supports the external constraints of a privacy protection nature for any business transaction involving an individual and its personal information.
017 5.3.6 Personal information shall not be used or disclosed by the seller (or regulator) for purposes other than for those it was originally collected as part of the business transaction, except with the informed consent of the individual, or as required by law. Secondary or derivative uses of personal information are not permitted.
018 5.3.6 Where the organization, having collected personal information for a specific purpose and goal of the execution of the business transaction, desires to use the relevant personal information for another purpose, it is necessary to obtain revised/new “informed consent” directly from the individual concerned.
019 5.3.6 Personal information shall be retained by the seller only for as long as is necessary for the fulfillment of those purposes as specified as part of the business transaction.
020 5.3.6 The seller shall identify to the buyer, especially where the buyer is an individual, any and all record retention requirements pertaining the resulting sets of recorded information forming part of the specified goal of a business transaction as a result of applicable external constraints of jurisdictional domain(s) as a result of the actualization of the business transaction.
021 5.3.6 Where the seller offers a warranty, or extended warranty, as part of the business transaction, the seller shall inform the buyer, when the buyer is an individual, of the associated added records retention requirements for the personal information associated with the warranty (including the purchase by the individual of an extended warranty).
© ISO 2014 – All rights reserved 137
515
![Page 138: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/138.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
022 5.3.6 Where the buyer in a business transaction is an individual, the seller shall inform the individual of any and all records retention requirements of personal information which is recorded as the result of the actualization of the business transaction, including:
1) personal information which is required to actualize the business transaction and the time period(s) for which such sets of personal information are to be retained;
2) additional personal information, i.e., in addition to (1), which is required to be collected and retained as a result of applicable external constraints, of whatever nature, of relevant jurisdictional domain(s); and/or,
3) additional personal information, i.e. in addition to (1) or (2), which is required to be collected and retained as a results of the invocation of an associated warranty, purchase of an extended warranty, or any other personal information which is required to be collected or retained as part of the post-actualization phase of an instantiated business transaction.
023 5.3.6 Where the buyer in business transaction is an individual, the seller shall inform that individual of the applicable record retention conditions where these pertain to personal information.
024 5.3.6 Where a business transaction does not reach the actualization phase, any personal information collected by the organization in support of that transaction shall be deleted by the organization (unless the individual concerned explicitly consents to the prospective seller to the retention of such personal information for a defined period of time).
025 5.3.7 Personal information shall be as accurate, complete and up-to-date as is necessary for the specified purposes for which it was collected in support of the business transaction.
026 5.3.8 Personal information shall be protected by operational procedures and safeguards and safeguards appropriate to the level of sensitivity of such recorded information and shall have in place (and tested) measures in support of compliance of compliance with privacy protection requirements of applicable jurisdictional domains, as well as any other external constraints which may apply such measures as are appropriate to ensure that all applicable legal requirements are supported.
027 5.3.9 An organization shall have and make readily available to any Person specific information about its policies and practices pertaining to the management and interchange of personal information under its control.
028 5.3.10 An individual has the right to know whether or not an organization has personal information under its control on or about that individual.
029 5.3.10 An organization, subject to privacy protection requirements, upon receiving a request from an individual shall inform that individual of the existence, use and disclosure of his or her personal information in any and all records management/information systems and in particular the DMAs of the IT systems which support the business transactions of that organization.
138 © ISO 2014 – All rights reserved
517
![Page 139: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/139.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
030 5.3.10 Where an organization discovers that it has personal information on the individual who made the request, that individual shall be given full and complete access to any and all personal information which the organization maintains on that individual (unless there exist specified and referenced external constraints of the applicable jurisdictional domain(s) which prohibit access to one or more sets of such personal information).
031 5.3.10 Where an organization has and maintains personal information on the individual making the request for access to his/her personal information and such personal information does exist, the organization shall provide access to the personal information in a manner which is convenient to that individual.
032 5.3.11 An individual shall be able to challenge the accuracy and completeness of his or her personal information held by an organization with respect to a business transaction (and/or part of a general client file) and have it amended or deleted as appropriate.
033 5.3.11 An individual shall be able to challenge an organization concerning its compliance with the above privacy protection principles 1 through 10, including assurance of privacy protection for any personal information that is interchanged with other organizations as agents or third parties (as well as secondary or derivative uses of personal information).
034 5.4 An organization shall have in place policies and procedures in order to identify and tag (or label) all sets of recorded information (SRIs) which contain personal information and do so at the appropriate level of granularity to facilitate compliance with specific privacy protection requirements.
035 5.4 For a field or data element comprising the recorded information pertaining to a business transaction, for personal information the following requirements apply from a data interchange perspective, the need to ensure the provision of a tag(s) to note that the personal information:
1) shall not be communicated with other parties;
2) may be communicated to other parties but with restrictions; or,
3) may be communicated to other parties with no restrictions.
036 5.4 For a field or data element comprising the recorded information pertaining to a business transaction, for personal information the following requirements apply from a data interchange perspective, i.e., the need to ensure the provision of a tag(s) to note that the personal information is subject to mandatory disclosure is:
1) the actual information;
2) anonymous information that represents the actual information; or,
3) pseudonyms that represents the actual information.
037 6.3 For any business transaction (or part thereof) which involves external constraint(s) of a privacy protection nature, the Open-edi model shall include:
1) the Person in the role of buyer as an individual;
2) the role of the regulator(s) representing the source of privacy protection
© ISO 2014 – All rights reserved 139
519
![Page 140: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/140.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
requirements for modelling as part of a scenario and scenario components;
3) the role of the regulator(s) providing proof of identity of the individual without necessarily disclosing the actual identity of the individual.
038 7.2.1 A common set of external constraints of a jurisdictional domain on a business transaction, where the buyer is an individual, are those of a privacy protection nature.
039 7.2.1 Where the buyer in a business transaction is an individual, external constraints of a privacy protection nature of jurisdictional domains apply and shall be supported in applicable business scenarios and scenario components.
040 7.2.1 Any Person offering a good, service, and/or right as a seller shall explicitly state whether or not the same is available for purchase by any Person in its role as an “individual”.
041 7.2.1 Where the buyer in a business transaction is an individual, external constraint of a privacy protection nature of jurisdictional domains apply and shall be supported in applicable business scenarios and scenario components.
042 7.2.1 A seller shall ascertain, at the identification phase in the process leading to a business transaction, whether or not the buyer is an individual (not someone as organization Person buying on behalf of an organization or public administration).
043 7.2.2 A common set of external constraints of a jurisdictional domain on a business transaction, where the buyer is an individual, are those of a consumer protection nature. As such, any business transaction involving an “individual” in the role of buyer shall be structured to be able to support applicable “consumer protection” requirements.
044 7.2.2 Where the buyer is an individual, the seller shall ascertain that the individual has the age qualification required by the jurisdictional domain to be able to be involved in and make commitments pertaining to the good, service and/or right being offered in the proposed business transaction.
045 7.2.2 A seller shall ensure that where it intends to sell a good, service and/or right to a buyer as an individual that consumer protection requirements of the applicable jurisdictional domain of the buyer are supported.
046 7.2.3 In the development of human interface equivalents (HIEs) for an ID code or a semantic identifier, these must also include those HIEs of a nature to ensure individual accessibility.
047 7.2.5 Privacy protection requirements apply only to a natural person, i.e., human being, acting in the role of an individual.
048 8.2 The primary set of generic principles and rules, as well as associated concepts and their definitions governing the creation, recognition, use, management of identities of a Person as stated in Clauses 6.1.4, and 6.2.2 of ISO/IEC 15944-1, apply here.
049 8.2 An individual may have and often does have multiple different personae, i.e., names in the lifetime of that individual. More than one persona may be valid in one
140 © ISO 2014 – All rights reserved
521
![Page 141: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/141.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
or more jurisdictional domains at the same time.
050 8.2 An individual may have, and often has, one or more recognized individual names (RINs), including two or more simultaneously existing RINs, and thus more than one recognized individual identity (rii).
051 8.3 Any Person acting in the capacity of a Registration Authority (RA) shall, for each of its Registration Schemas (RS) involving the registration of an individual, be identified as observing the rules governing and ensuring the assignment of a unique identifier for each individual as a member of that registration schema.
052 8.3 A Registration Authority shall assign a unique identifier to each of its registered members including, where relevant, where the member is acting as an individual.
053 8.3 Where the Registration Schema (RS) of a Registration Authority allows for the registration of Persons and differentiates among sub-types of Persons, i.e., individuals, organizations and/or public administrations, the Registration Authority shall ensure that:
1) any registration involving an individual is so identified; and,
2) that privacy protection requirements which apply to resulting or associated personal information are identified and supported.
054 8.3 Where a Registration Authority (RA) administers more than one Registration Schema which involves individuals (and their associated personal information), the RA shall not use personal information provided by the individual under one Registration Schema (RS) in another RS of the RA without the explicit consent of the individual concerned unless required by applicable law.
055 8.4 The individual identity, i.e., the persona and the associated identifier, used by an individual in a business transaction, shall be capable of being prescribed depending on the context and goal of the business transaction.
056 8.4 A specific individual identity (ii) established by a Registration Authority, (organization or public administration), should not be used for any purpose other than that for which it was created, without the express and explicit consent of the individual.
057 8.4 For any persona Registration Schema which includes, in whole or in part, individuals as members, external constraints of a privacy protection nature apply and all its registrants which are individuals shall be managed as members of an individual persona Registration Schema (ipRS) in accordance with applicable privacy protection requirements.
058 8.4 A Registration Authority (RA) for individuals shall have explicitly stated rules for transforming an individual identity into a recognized individual identity to meet a stated business requirement.
059 8.4 The rules governing a business transaction shall either require the use of a specified recognized individual identity (rii) or allow for several of a similar nature.
060 8.4 In a business transaction, individual authentication is established by either:
© ISO 2014 – All rights reserved 141
523
![Page 142: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/142.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
1) mutual definition and acceptance: or,
2) referring to predefined individual persona registration schema (ipRS) and process of a particular RA
061 9.2 The Clause 8.4 “Rules for the specification of Open-edi roles and role attributes”, as stated in ISO/IEC 15944-1 are mandatory where the business transaction involves an individual as a buyer.
062 9.2 Prior to the start of the actualization phase of a business transaction, a seller shall ascertain whether or not the Person acting as a buyer is doing so in its capacity or status as an individual (rather than as an organization Person or other roles of a Person).
063 9.2 Where the buyer in a business transaction is an individual, the buyer shall:
1) ensure that privacy protection requirements as stated in this part of ISO/IEC 15944 are applied; and,
2) ascertain whether or not other external constraints apply with respect the individual meeting specified criteria of the applicable jurisdictional domain(s) in qualifying for the role of buyer with respect to the good, service, and/or right which is the goal of the business transaction.
064 9.2 When the identification and negation phase of a business transaction does not result in its actualization and the prospective buyer is an individual, the seller (or regulator) shall delete all personal information on that individual gathered at that time.
065 9.3 The rules in Clause 6.6.2.3 “Personae as legally recognized names (LRNs)”, as stated in ISO/IEC 15944-5 apply.
066 9.3 Where the buyer in a business transaction is an individual, the seller shall inform itself as to whether external constraints apply which require the individual to use a legally recognized name (LRN) as its persona, as well as the nature of the Source Authority for such a LRN.
067 9.4 The rules governing the truncation of a persona, as stated in ISO 7501 and ISO 7812 ISO/IEC 15944-1, apply to this Part of ISO/IEC 15944.
068 9.4 Where external constraints on a business transaction require an individual as a (potential) buyer using a legally recognized name (LRN) as the persona for that individual, the seller shall specify the types of LRNs permitted to be used by the individual.
069 9.4 Where external constraints on a business transaction require that the personae of the individual be provided using a specified language or character set which is different from the language which the individual uses for his/her persona (or is his/her birth name), then the transliteration rules of ISO 7501 shall apply.
070 9.5 Identification of a Person as buyer in a business transaction is not always necessary in (electronic) business transaction involving the seller knowing whether or not the buyer is an individual.
142 © ISO 2014 – All rights reserved
525
![Page 143: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/143.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
071 9.5 Unless explicitly proscribed, (not allowed) by external constraints of the relevant jurisdictional domain applicable to the specified goal of the business transaction to be entered into, an individual as buyer many decide to remain anonymous in that business transaction, and no personal information on the individual is maintained by the seller or other parties
072 10.1 Conceptually, a business transaction can be considered to be constructed from a set of fundamental activities: planning, identification, negotiation, actualization and post-actualization.
073 10.1 These five fundamental activities may take place in any order.
074 10.1 A Person may terminate a business transaction by any agreed method of conclusion.
075 10.1 The activities may be completed in a single continuous interactive dialogue or through multiple sets of interactions among buyer and seller.
076 10.3 During the identification phase, the seller shall ascertain whether or not the buyer is an individual, and if so, inform the individual of the privacy policy of the seller.
077 10.4 Where the buyer is an individual, the end of the negotiation phase shall include the explicit consent of the individual for provision of its personal information, as identified and specified, as well as the specification of the information life cycle management (ILCM) and EDI aspects of such personal information, as stated in Clause 5.3 “Privacy Principles”.
078 10.5 Where the buyer is an individual, the seller shall ensure and have in place supporting procedures and mechanisms to support both the generic privacy protection requirements as: (1) found in this part of ISO/IEC 15944 and stated in its rules and guidelines; and, (2) as well as those resulting from the negotiation phase, i.e., as negotiated between the seller and the individual as buyer.
079 10.6 A buyer (and its agent(s)) or third party (or any other party to the business transaction), shall not retain any personal information on the individual as the buyer for any time longer than is consented to by the individual for post-actualization purposes unless external constraints of the applicable jurisdictional domain requires retention of such personal information for a longer period.
080 10.6 Where the buyer gifts the product to another individual, and the terms of the purchase allow the recipient individual to assume the warranty, extended service contract, etc., the seller shall ensure that such a recipient individual is fully informed of its privacy protection rights, including the record retention requirements.
081 11.2 Each instantiated business transaction involving an individual as a buyer shall have a business transaction identifier (BTI) assigned by the seller or the regulator.
082 11.2 Where an individual as a buyer in a business transaction decides to be anonymous (as permitted by the external constraints of the applicable jurisdictional domain), the business transaction identifier (BTI) serves as the sole identifier.
083 11.2 Where the business transaction is of the nature of a regulatory business transaction (RBT) and the rules governing the RBT permit an individual to be a buyer, such rules shall explicitly state and define the associated personal
© ISO 2014 – All rights reserved 143
527
![Page 144: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/144.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
information in conformance with this part of ISO/IEC 15944.
084 11.3 The rules governing state changes of recorded information (Clause 6.6.4.3 “State Changes” in ISO/IEC 15944-5) apply to any business transaction involving an individual as a buyer.
085 11.4 The rules governing the specification of records retention requirements are stated in Clause 8.5.2.8 and 8.5.2.9 in ISO/IEC 15944-1 and in Clause 6.6.4.2 of ISO/IEC 15944-5 and are mandatory to any business transaction involving an individual as a buyer, i.e., to all resulting information.
086 11.4 Where the buyer is an individual, the seller shall inform the buyer of all records retention aspects, whether of internal or external information, with respect to the sets of recorded information (SRIs) pertaining to the personal information forming part of the business transaction, and in particular those pertaining to the post-actualization phase.
087 11.5 The rules governing temporal referencing as stated in Clause 6.6.4.5 “Date/time referencing” as stated in ISO/IEC 15944-5 apply when the individual is a buyer in a business transaction and thus privacy protection requirements apply.
088 11.5 Unless otherwise specified and agreed to by the individual as buyer in a business transaction, the common temporal referencing schema of the jurisdictional domain of the individual applies.
089 11.5 The temporal referencing schema governing the business transaction where the buyer is an individual shall also be used to ensure deletion of sets of personal information as required by privacy protection requirements.
090 12.2 It is important in scoping an Open-edi scenario to specify at the outset whether or not external constraints apply to the business transaction being modelled.
091 12.2 It is equally important in scoping an Open-edi scenario which allows for an individual as buyer in a business transaction to note whether this is an adaptation of an existing “generic” Open-edi scenario or a new Open-edi scenario.
It is understood that (a) most of the Open-edi scenarios will be and are modelled at the Person level; and, (b) that many of these need only minor modifications in their modelling of such scenarios to incorporate privacy protection requirements.
F-001 F.1 Management and control of state change, retention and destruction of personal information shall be based on the application of the integrated set of information life cycle management (ILCM) principles.
F-002 F.2.2 Where an individual is a party to a business transaction, i.e., as a buyer, the seller (as an organization or public administration) shall have in place rules governing state changes, if any, for personal information (at whatever level of granularity required) in support of data management and interchange required to comply with privacy protection requirements
F-002 [sic] F.2.2 An instantiated business transaction shall have one or more IB or SC for which no state changes are permitted. One of these is to serve as the transaction ID number, i.e., a business transaction identifier (BTI), for the instantiated business
144 © ISO 2014 – All rights reserved
529
![Page 145: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/145.jpg)
CD ISO/IEC 15944-12:2014(E)
Rule No. Clause ID Rule Statement
(1) (2) (3)
transaction.
F-003 F.2.2 If a state change is required, the seller (and/or regulator) shall specify the number of state changes permitted.
F-004 F.3 Where an individual is a buyer to a business transaction, the seller shall specify who is responsible for the retention of any (combination of) set(s) of recorded information during the negotiation phase and no later than at the actualization phase in accordance with privacy protection requirements.
F-005 F.3 Where an individual is a buyer in a business transaction the seller shall ensure that all other parties to the instantiated business transaction, as applicable, (e.g., a regulator, an agent, and/or third party) are informed of records retention (and destruction requirements).
F-006 F.3 Where an individual is a buyer to a business transaction, the seller shall specify the “retention trigger” activating records retention requirements in accordance with privacy protection requirements of the applicable jurisdictional domain(s).
F-007 F.4 Where an individual is a buyer to a business transaction, the seller shall specify the disposition action to be taken at the end of the expiry of the record retention period in accordance with privacy protection requirements of the applicable jurisdictional domain.
© ISO 2014 – All rights reserved 145
531
![Page 146: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/146.jpg)
CD ISO/IEC 15944-12:2014(E)
Annex C(normative)
Linking ILCM to process phases of a business transaction
Project Co-Editors’ Notes:
1. Unfortunately, the June, 2013 Beijing meeting of SC32/WG1 was cancelled. On result being that important decision identified for the Beijing are now deferred to the upcoming November, 2014 Toronto meeting. where contents of this Annex be reviewed and discussed in detail and decision recorded as part of the CD ballot resolution comment process in order to finalize the contents of this Annex for Part 12.
2. It is recognized that decisions taken here may impact other clauses and Annexes in Part 12.
3. Comments and inputs from P-members and experts are welcome here.
C.1 Introduction
The purpose of this Annex is to provide an informative and high level view of the link of the ILCM to the five process phases85 in the Business Transaction Model (BTM)86.
C.2 Rules governing linkages of ILCM process to process component of the Business Transaction Model (BTM)
In modelling a business transaction, from a process perspective, five phases were identified. {See ISO/IEC 15944-1 Clause 6.3} They are:
a) planning;
b) identification;
c) negotiation;
d) actualization;
e) post-actualization.
From this perspective, the following rules apply.
Rule C01:If the SRIs interchanged between a seller and a buyer do not result in the actualization of a business transaction, any such EDI activities interchanged as IBs (or SCs) between the seller and the prospective buyer, as an individual shall be considered to be of the nature of a transitory record and any personal information pertaining to that individual shall be expunged unless the individual as a prospective buyer agrees to the retention by the prospective seller of one or more SRIs of his/her personal information.
85 The rules and definitions of “process component” of the Business Transaction Model (BTM) apply to this Part 12 Annex. They are stated in Clause 6.3 “Rules governing the process component” in ISO/IEC 15944-1.
86 The rules and definitions of the Business Transaction Model (BTM) apply to this Part 12 Annex. They are stated in Clause 6.1.5 “Business transaction model: Key components” in ISO/IEC 15944-1.
146 © ISO 2014 – All rights reserved
533
4044404540464047
4048
40494050405140524053
4054
4055
4056
40574058
40594060
40614062
4063
4064
4065
4066
4067
4068
4069407040714072407340744075
534535
536537
![Page 147: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/147.jpg)
CD ISO/IEC 15944-12:2014(E)
For example, even though no business transaction was concluded the individual may consent to receive a catalogue, product offerings, information on sales, etc., by the prospective seller.
Rule C02:Where post-actualization requirements apply to the product, services and/or rights of the goal of a business transaction and its actualization apply, the organization acting in the role of seller (or regulator) needs to have rules which support the following (sub-) scenarios:a) the ability of the seller to transfer post-actualization responsibilities to an agent, (e.g., servicing of
a warranty) with the associated transfer of (defined) personal information of the buyer;b) the ability of the buyer, as an individual, to “gift” the product, service and/or right to another
individual. In such a context, the seller needs to (i) add personal information on the warranty holder; and, (ii) delete all “no longer required” personal information on the “individual” who was the buyer.
C.3 Figurative overview of linking the five phases of the process component of the Business Transaction Model (BTM) to ILCM requirements
Figure C.1 below provides a (high level) overview of the linkages of the five phases of the Business Transaction Model (BTM) to the ILCM model.
© ISO 2014 – All rights reserved 147
539
4076
40774078
4079
40804081408240834084408540864087408840894090
4091
40924093
40944095
![Page 148: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/148.jpg)
CD ISO/IEC 15944-12:2014(E)
Figure C.1 Overview- linking the five phases of the process component of the Business Transaction Model (BTM) to ILCM requirements
148 © ISO 2014 – All rights reserved
Process Phases in modelling a business transaction where the “buyer’ is an “individual”
Planning
Identification
Negotiation
Actualization
Post-Actualization
ILCM & Privacy protection Requirements context not applicable to “cash” transactions, buyer is anonymous or no post-actualization is associated with the (proposed......???incomplete
Seller Side: Not applicable – no “binding” between seller and buyer. No personal information of a prospective buyer as an individual. Buyer Side: Applicable if individual as prospective buyer has made his/her personal information known (publicly available).
Seller required to determine whether prospective buyer is an individual or not. Seller (prospective) should identify his/herself as individual if in this role. If transaction ends here = transitory record to be expunged, unless individual agrees that buyer can retain personal information for a use which must be specified and agreed to.
Includes individual and seller determining and agreeing to ILCM aspects and conditions. Identify ICLM external constraints, when applicable,
If no “actualization” need agreement on how long personal information on prospective buyer (individual) can be retained by (prospective) seller. Then expunge (unless overridden by external constraints).
May include the provision of additional personal information by buyer to the seller. If agents or third parties are involved, the associated ICLM requirements need to accompany the IBs & SCs in the EDI. Further the seller needs to ensure that agents and/or buyers execute/implement the associated ICLM demands (especially those of a records retention nature).
Post-Actualization aspects can be established at any time, including in the Planning phase. This Phase may require the seller to retain specified SRIs for a determinate period before their expungement. It also may require the individual as warranty holder to retain certain SRIs. The seller may transfer warranty obligations to an agent (along with transfer of personal information).
541
4096
40974098409941004101410241034104
4105
![Page 149: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/149.jpg)
CD ISO/IEC 15944-12:2014(E)
Annex D(normative)
Generic approach to I*LCM decisions in a privacy protection requirements context – ILCM decision template
Project Co-Editors’ Notes:
1. At the June, 2014 Beijing meeting of JTC1/SC32/WG1 a significant amount of time is requested for the participating SC32/WG1 experts to develop this Annex further. Unfortunately, the June 2014 Beijing meeting had to be cancelled. This means that discussions planned and decisions to be made with respect to Annex D have been deferred to the November, 2014, Toronto meeting.
2. The primary purpose of this Annex is to serve as a self-standing document for use by implementers and users of ISO/IEC 15944-12, to facilitate their conformance with ISO/IEC 15944-12.
3. When completed this Annex will contain one (or more) decision charts and accompanying “check-off” templates.
D.1 Introduction
The primary purpose of this Annex is to provide a high level generic, i.e., primitive level, approach using a decision flow chart template approach for use by a Person, i.e., organization or public administration, in the role of a seller or regulator in a commitment exchange, (e.g., business transaction) process with respect to applicable ILCM requirements where the buyer (or client) is in the role of an individual.
D.2 Generic approach to ILCM decisions in a privacy protection requirements context
D.2.1 Link to applicable records and retention and disposal of personal information and “transitory records”
The Part 12 development work incorporates that of D.2. above re: “transitory records” and the post-actualization phase being applicable to a business transaction. These represent two very particular and specific sub-types of the overall approach (and model).
The purpose of Figure A.2 is to present a high-level approach of the key aspects and decisions pertaining to ILCM requirements without being linked to a particular process phase for modelling a business transaction.
A “transitory record” is a concept which pertains to SRIs which are ephemeral or have a short temporal life span. In the context of the (a) business transaction model (BTM) and the five phases of the process model; and, (b) privacy protection requirements, a “transitory record” pertains to any SRI (or combination of the same) interchanged as IBs (and their SCs) during the “planning, identification and negotiation phases” directed at the establishment, i.e., actualization, of a business transaction but which did not pass the negotiation phase and thus were never actualized.
This means that the buyer and seller interchanged as IBs (and their SCs) various SRIs. The prospective buyer is an individual, this means that personal information was provided by the individual, as buyer, to the seller, as organization.
Rule D01:
© ISO 2014 – All rights reserved 149
543
41064107410841094110
4111
4112411341144115
41164117
41184119
4120
4121412241234124
4125
41264127
41284129
413041314132
41334134
413541364137413841394140
414141424143
4144
![Page 150: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/150.jpg)
CD ISO/IEC 15944-12:2014(E)
Unless explicitly agreed to by an individual as a prospective buyer in a business transaction any personal information provided by the prospective buyer to the seller (or collected by the seller) which did not result in the actualization phase of that business transaction, shall be considered to be a “transitory record” and be expunged by the seller organization.
Rule D02:In the context of Rule Dnn1 the seller (organization) may request that a limited and specified SRI(s) of personal information may be retained for pre-defined use of such personal information of the (prospective) buyer as an individual.
Examples include the individual agreeing the retention of specified personal information (SRIs) by the seller organization with respect to sending a catalogue, special sales/deals, the assignment of a (prospective) customer ID, etc.
Figure D.1 below presents a very primitive level approach only. It incorporates the concept of “transitory record” as well as “post actualization” phase being applicable to a business transaction. These represent two very particular and specific aspects of ILCM requirements for personal information.
{Figure D.1 below is a draft only.}
Figure D.1 Decision Tree Diagram for identification and disposition of a SPI from an ILCM requirements perspective (including it being declared a transitory record”
150 © ISO 2014 – All rights reserved
1. Creation of personal information as one or more SPIs pertaining to a business transaction
2. Transitory Yes/ No
2.1 If Yes, Expunge*
3. Establish/Apply Records Retention Schedule* (including retention triggers)
4. End of Retention period invoke disposition actions
4.3 destroy/expunge4.1 Transfer Out* –to another organization
4.2 Transfer in*- (copy) to archive, historical, research purposes
4.4 Maintain as permanent record/SRI*
4.5 Other?
* Indicates that external constraints related to the nature of the business transaction may apply
545
4145414641474148414941504151415241534154415541564157
415841594160
41614162
416341644165
![Page 151: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/151.jpg)
CD ISO/IEC 15944-12:2014(E)
D.2.2 Link to “post actualization” requirements
It is recognized that post actualization requirements maintain specific SRIs of a personal information nature require the seller (organization) in the business transaction to retain associated personal information for a longer temporal period than may be the default.
For example, an individual as buyer may or may not decide to purchase a warranty over and above that offered by the seller as the “default” time period warrant. Another example is that of the seller offering a “life time warranty” to the buyer.
Another example is the creation and collection by sellers (or their agents) of “points” programs which involve accumulation and retention of personal information for an indefinite temporal period.
[to be completed as a result of the SC32/WG1 meetings as well a P-member CD ballot comments.]
© ISO 2014 – All rights reserved 151
547
4166
416741684169
417041714172
41734174
4175
4176
4177
![Page 152: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/152.jpg)
CD ISO/IEC 15944-12:2014(E)
Annex E(Informative)
Generic approach to identification of properties and behaviours of personal information as SRI transitory records and their
disposition/expungement
Project Co-Editors’ Notes:
1. The issuance of the draft CD for Part 12 (as well as earlier SC32/WG1 discussions) identified the importance of addressing the issue of “transitory records” in an ILCM perspective and in a privacy protection requirements context.
2. Addressing this issue has been completed to a certain extent within the normative clauses and their rules and associated text. The purpose of this Annex E is to provide added information.
3. P-members are requested to review the text below, provide suggestions & comments, including questions, etc. These will be resolved das part of the Toronto, November, 2014 JTC1/SC32/WG1 CD ballot comment resolution meeting.
E.1 Introduction
The concept of “transitory record”, its definition and application is well-known in the records and information management community basically as a (standard) internal constraint within an organization. It became linked to external constraints of advent of legislation and pursuant regulations with Access to Information (ATI) nature and that pertaining to privacy/data protection legislation.
From an Access to Information (ATI)/freedom of information (FOI) external constraints perspective, the need for a clear and explicitly stated definition of the concept of “transitory record” came from the concern that public administrations subject to such external constraints would delete (expunge) recorded information while an “Access to Information (ATI) Request” for such information was in progress. For a public administration perspective, the concern was that Access to Information Requests would “gum up” or stop the normal records/data management processes for deleting/expunging records.
From a privacy/data protection external constraints perspective the need for a clear and explicit definition of the concept of “transitory record” and associated rules arose from the fact that any and all recorded information pertaining to an individual, especially that used for decision or commitment making are “personal information” and thus need to be available to the individual concerned.
From an IT perspective, is the fact that prior to the advent of the widespread use of IT systems a substantial amount of what are now “transitory records” were dealt with in “face-to-face” meetings, via telephone conversations, etc,, with only the “final” decision being recorded (or at times just agreed to without a written record). The introduction and advent of emails, and later IT systems based teleconferences has as one result that all information of this nature is now “recorded information” and therefore where it pertains to or involves an “individual” subject to privacy protection requirements.
The following Clauses of Annex E address these issues in a Part 12 context.
152 © ISO 2014 – All rights reserved
549
417841794180418141824183
4184
4185
418641874188
41894190
419141924193
4194
4195419641974198
419942004201420242034204
4205420642074208
420942104211421242134214
4215
![Page 153: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/153.jpg)
CD ISO/IEC 15944-12:2014(E)
E.2 Definition of the concept of “SRI transitory record”
The definition of “SRI transitory record” is:
3.161transitory recordSRI that is required only for a very limited and specified (retention period) time to ensure the completion of a routine action or the preparation of a subsequent SRI
NOTE A transitory SRI is expunged at the end of a short existence.
The use of the label “transitory record” serves as a bridge to well established and widely used records management standards.
AT the same time use of “SRI” is the label for the concept used to serve as a bridge to the ISO/IEC 15944 family of standards where the concept and definition of an “SRI” serves as an umbrella for what in other ISO and ISO/IEC standards (As well as communities of practice) are known as “records, documents”, “files”, “data elements, even “database”, etc., or in an EDI context, “information bundles”, “semantic components (SCs)”.
As such, a “set of recorded information (SRI) serves as higher level, primitive concept and is linked directly to the degree and level of granularity at which an organization manages and interchanges recorded information.
E.3 Information on examples of “SRI transitory records”
Project Co-Editors’ Notes:
1. The following examples are taken from websites of various governmental public administrations of Australia, Canada, UK, and USA.
2. It may well be that some of the examples “overlap” and can/should be consolidated. CD ballot comments and suggestions are most welcome.
Basically, “transitory records” are those SRIs which are required only for a very limited (Temporary) time to ensure the completion of a routine action or the preparation of a subsequent (final/complete) SRI.
SRI transitory records include:
a) Recorded information of temporary usefulness that are not an integral part of the operational record (for that individual) by the organization);
b) Convenience copies such as extra copies of an SRI which are created and retained for a short period only for the convenience of reference;
c) Working materials or drafts used in the preparation of the final “SRI” (And which are not required to be retained for legal, statutory or evidentiary purposes). This includes drafts and revisions that are not needed to document decisions and associated approvals authorizations or related aspects of the making of commitments (pertaining to a business transaction);
d) (electronic) SRIs entered into an IT system during an update process and not required for operational, audit or legal purposes;
e) (electronic) SRIs containing data that are manipulated, sorted and/or moved from one “run”, i.e., the execution of a computer program to a subsequent “run” in the process of updating a master file or database;
© ISO 2014 – All rights reserved 153
551
4216
4217
421842194220422142224223
42244225
4226422742284229
42304231
4232
4233
4234
42354236
42374238
42394240
4241
42424243
42444245
4246424742484249
42504251
425242534254
![Page 154: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/154.jpg)
CD ISO/IEC 15944-12:2014(E)
f) (electronic) SRIs generated during the creation or use of a master file or database which contain data on the operation of the IT system except where they are required to support the integrity of the master file(s) or database(s);
g) Test records such as SRIs consisting of routine or bench mark data constructed or used for the purpose of testing IT system performance (including text messages and related communication activities).
h) A SRI that is required only for a very short period of time to ensure the completion of a routine action or the preparation of the final SRI itself (e.g. SRIs related to an online e-business in its planning phase which is not utilized in the actualization of a business transaction such as the making of a travel reservation).
i) I) Other?
154 © ISO 2014 – All rights reserved
553
425542564257
425842594260
4261426242634264
4265
4266
![Page 155: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/155.jpg)
CD ISO/IEC 15944-12:2014(E)
Bibliography
Project Co-Editors’ Note:
1. This Bibliography will be updated as required (a) from the draft CD to the CD stage; (b) from the CD to DIS stage; and, (c) from the DIS to FDIS stage.
The bibliography is organized in two parts. The first identifies sources that are ISO and ISO/IEC international standards. The second cites other cited sources which are useful to the understanding of this part of ISO/IEC 15944.
1. ISO and ISO/IEC international standards
ISO/IEC 9798-1:1997(E), Information technology — Security techniques — Entity authentication — Part 1: General
ISO/IEC 10181-2:1996(E), Information technology — Open Systems Interconnection — Security frameworks for open systems: Authentication framework
ISO/IEC 11179-1:2004(E), Information technology — Metadata Registries (MDR) — Part 1: Framework
ISO/IEC 11179-3:2003(E), Information technology — Metadata Registries (MDR) — Part 3: Registry metamodel and basic attributes
ISO/IEC TR 13335-1:1996(E), Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security
ISO/IEC TR 15285:1998(E), Information technology — An operational model for characters and glyphs
ISO 15489-1:2001(E/F), Information and documentation — Records management — Part 1: General/ Information et documentation — «Records management» — Partie 1: Principes directeurs
ISO/IEC 15944-6:2009(E), Information technology — Business Operational View — Part 6: Technical introduction to eBusiness modelling
ISO 19115:2003(E), Geographic information — Metadata
ISO 19135:2005(E), Geographic information — Procedures for item registration
ISO/TS 25237:2008(E), Health informatics — Pseudonymization
ISO/IEC 27002:2005(E), Information technology — Security techniques — Code of practice for information security management
2. Other
GS1Global Traceability Standard (GDSN). Issue 1.2.2. (March, 2010). Available from: http://www.gs1.org/docs/gsmp/traceability/Global_Traceability_Standard.pdf (Accessed 2011-10-04)
GS1 Global Data Dictionary: http://gdd.gs1.org/GDD/public/searchableglossary.asp (Accessed 2011-10-04)
Hern, Alex, (21 July, 2014) Personal data removed from Irish Genealogy site over security fears. The Guardian. http://www.theguardian.com/technology/2014/jul/21/ireland-shuts-government-genealogy-personal-data-concerns (Accessed 2014-27-07).
Quittner, Joshua. (Monday, 8 February, 1999). Going private. Time 153(5):62 (8 February, 1999). Available from: http://www.time.com/time/magazine/article/0,9171,990168,00.html (Accessed 2011-10-04)
© ISO 2014 – All rights reserved 155
555
4267
4268
42694270
427142724273
4274
42754276
42774278
4279
42804281
42824283
4284
42854286
42874288
4289
4290
4291
42924293
4294
42954296
4297
429842994300
43014302
![Page 156: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/156.jpg)
CD ISO/IEC 15944-12:2014(E)
Sun, Wenfeng and Jake V.Th. Knoppers, (12 June, 2014). “Timely, accurate and relevant data only: Privacy protection requirements on Big Data”. Prepared for the JTC1/SC32 Open Forum on Big Data.: ISO/IEC SC32/WG1 N0745.
UN. International Covenant on Economic, Social and Cultural Rights. (1966), Available from: http://www2.ohchr.org/english/law/cescr.htm. (Accessed 2011-10-04)
UN Universal Declaration of Human Rights (1948) Available from http://www.un.org/en/documents/udhr/ (Accessed 2011-10-04)
UN. Universal Declaration of Rights of Persons belonging to National or Ethnic, Religious and Linguistic Minorities. Available from: http://www2.ohchr.org/english/law/minorities.htm (Accessed 2011-10-04)
UNESCO Universal Declaration of Cultural Diversity (Paris, November, 2001). Available from http://unesdoc.unesco.org/images/0012/001271/127160m.pdf (Accessed 2011-10-04)
156 © ISO 2014 – All rights reserved
557
430343044305
43064307
43084309
43104311
43124313
![Page 157: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/157.jpg)
CD ISO/IEC 15944-12:2014(E)
Abstracts
[Abstracts of the Part 12 standard in the languages in which the abstracts are available. Useful since ISO catalogue provides only the abstract in the language in which the standard is published].
© ISO 2014 – All rights reserved 157
559
4314
43154316
![Page 158: Basic template for the development of ISO and ISO/IEC ...jtc1sc32.org/doc/N2551-2600/32N2555-text_for_comment-WD_15944-12.doc · Web view[iso/iec 14662:2010, 3.27] 3.147 semantic](https://reader030.vdocuments.mx/reader030/viewer/2022040909/5e826e1243e4a05010249952/html5/thumbnails/158.jpg)
CD ISO/IEC 15944-12:2014(E)
ICS 35.240.60Price based on 134 pages
© ISO/IEC 2013 – All rights reserved
561
4317
4318
562