ISO/IEC 29187-1:2013
Current
The latest, up-to-date edition.
Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
06-02-2013
Foreword
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and acronyms
5 Fundamental principles and assumptions governing
privacy protection requirements in learning
transactions involving individual learners (external
constraints perspective)
6 Collaboration space and privacy protection
7 Public policy requirements of jurisdictional domains
8 Principles and rules governing the establishment,
management and use of identities of an individual
(and 'individual learner')
9 Person component - individual sub-type
10 Process component
11 Data (element) component of a learning transaction
12 Conformance statement
Annex A (normative) - Consolidated list of terms and
definitions with cultural adaptability: ISO
English and ISO French language equivalency
Annex B (normative) - Learning Transaction Model (LTM):
classes of constraints
Annex C (normative) - Integrated set of information
life cycle management (ilcm) principles in
support of information law compliance
Annex D (normative) - Coded domains for specifying
state change and record retention management
in support of privacy protection requirements
Annex E (informative) - Use and adaptation of the
ISO/IEC 14662 Open-edi Reference Model
Annex F (informative) - Potential parts 2+ for ISO/IEC 29187
based on results of the ISO/IEC JTC1/SC 36
Ad-Hoc on Privacy (AHP)
Bibliography
ISO/IEC 29187-1:2013 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of ICT-based learning transaction where the individual has the role of an individual learner. It provides users and designers with a methodology and tools addressing privacy protection and related requirements imposed by applicable jurisdictional domains.
ISO/IEC 29187-1:2013 takes the "learning operational view" (LOV) aspects based on the ISO/IEC 14662 Open-edi Reference Model (a freely available ISO standard) together with applicable ISO standards including ISO/IEC 15944-1 and ISO/IEC 15944‑5 (also available without charge) as well as many other international referenced specifications.
ISO/IEC 29187-1:2013 models the requirements of jurisdictional domains as external constraints upon the creation, use, interchange, and information life cycle management of personal information. ISO/IEC 29187-1:2013 addresses the specified context of public policy requirements of jurisdictional domains controlling the use of personal information (PI). These include regulations for consumer protection, privacy protection, individual accessibility, etc.
ISO/IEC 29187-1:2013 in a LET context identifies and expands upon eleven generic, primitive, international principles that have been associated with privacy protection requirements by international, regional, and UN member states. It models them with respect to the "collaboration space" of a learning transaction and commitment exchange involving an individual acting in the role of an individual learner. In a LET context, it provides principles and rules governing the establishment, management and use of identifiers of that individual, including the use of legally recognized names (LRNs), recognized individual identity (rii), and methods of non-identification, such as the use of anonymization and pseudonymization of personal information.
ISO/IEC 29187-1:2013 also sets out principles governing information lifecycle management (ILCM) as well as the rules and associated coded domains for obtaining informed consent for collection, specifying state changes, records retention, record deletion and related matters in support of privacy protection requirements.
Committee |
ISO/IEC JTC 1/SC 36
|
DocumentType |
Standard
|
Pages |
181
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
NS ISO/IEC 29187-1 : 2013 | Identical |
NEN ISO/IEC 29187-1 : 2013 | Identical |
IS/ISO/IEC 29187 : Part 1:2019 | Identical |
BS PD ISO/TR 20748-2 : 2017 | INFORMATION TECHNOLOGY FOR LEARNING, EDUCATION AND TRAINING - LEARNING ANALYTICS INTEROPERABILITY - PART 2: SYSTEM REQUIREMENTS |
ISO/IEC TR 20748-2:2017 | Information technology for learning, education and training Learning analytics interoperability Part 2: System requirements |
ISO/IEC 20016-1:2014 | Information technology for learning, education and training — Language accessibility and human interface equivalencies (HIEs) in e-learning applications — Part 1: Framework and reference model for semantic interoperability |
ISO/TS 25237:2008 | Health informatics Pseudonymization |
ISO/IEC 15944-1:2011 | Information technology — Business operational view — Part 1: Operational aspects of open-edi for implementation |
ISO 22857:2013 | Health informatics — Guidelines on data protection to facilitate trans-border flows of personal health data |
ISO 1087-1:2000 | Terminology work Vocabulary Part 1: Theory and application |
ISO/IEC 7812-2:2017 | Identification cards — Identification of issuers — Part 2: Application and registration procedures |
ISO/IEC 11179-3:2013 | Information technology — Metadata registries (MDR) — Part 3: Registry metamodel and basic attributes |
ISO/IEC 15944-4:2015 | Information technology — Business operational view — Part 4: Business transaction scenarios — Accounting and economic ontology |
ISO/IEC 7501-2:1997 | Identification cards — Machine readable travel documents — Part 2: Machine readable visa |
ISO 5127:2017 | Information and documentation Foundation and vocabulary |
ISO/IEC TR 15944-6:2015 | Information technology — Business operational view — Part 6: Technical introduction to e-Business modelling |
ISO/IEC 15944-7:2009 | Information technology — Business operational view — Part 7: eBusiness vocabulary |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 19108:2002 | Geographic information Temporal schema |
ISO/IEC 14662:2010 | Information technology — Open-edi reference model |
ISO/IEC 6523-1:1998 | Information technology — Structure for the identification of organizations and organization parts — Part 1: Identification of organization identification schemes |
ISO/IEC 19501:2005 | Information technology — Open Distributed Processing — Unified Modeling Language (UML) Version 1.4.2 |
ISO 3166-2:2013 | Codes for the representation of names of countries and their subdivisions Part 2: Country subdivision code |
ISO 19115:2003 | Geographic information Metadata |
ISO 8601:2004 | Data elements and interchange formats Information interchange Representation of dates and times |
ISO/IEC 15944-5:2008 | Information technology — Business operational view — Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
ISO 639-2:1998 | Codes for the representation of names of languages — Part 2: Alpha-3 code |
ISO/IEC 7501-1:2008 | Identification cards — Machine readable travel documents — Part 1: Machine readable passport |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 7501-3:2005 | Identification cards — Machine readable travel documents — Part 3: Machine readable official travel documents |
ISO 19135:2005 | Geographic information — Procedures for item registration |
ISO/IEC 7812-1:2017 | Identification cards — Identification of issuers — Part 1: Numbering system |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ISO/IEC 6523-2:1998 | Information technology — Structure for the identification of organizations and organization parts — Part 2: Registration of organization identification schemes |
ISO/IEC 15944-2:2015 | Information technology — Business operational view — Part 2: Registration of scenarios and their components as business objects |
ISO/IEC 5218:2004 | Information technology Codes for the representation of human sexes |
ISO 15489-1:2016 | Information and documentation Records management Part 1: Concepts and principles |
ISO/IEC TR 15285:1998 | Information technology An operational model for characters and glyphs |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
SA/SNZ TS ISO/IEC 20748.4:2020 | Information technology for learning, education and training - Learning analytics interoperability Privacy and data protection policies |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.