ITU-T X.1171 PDF

ITU-T X.1171 PDF

Name:
ITU-T X.1171 PDF

Published Date:
02/01/2009

Status:
[ Active ]

Description:

Threats and requirements for protection of personally identifiable information in applications using tag-based identification

Publisher:
International Telecommunication Union-T

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$9.9
Need Help?

The scope of this Recommendation covers the following objectives including threats and requirements for protection of personally identifiable information (PII) in applications using tag-based identification as described below:

– To describe PII threats in a business-to-customer (B2C)-based environment of applications using tag-based identification;

– To identify requirements for PII protection in a B2C-based environment of applications using tag-based identification.

The following objectives are not covered by the scope of this Recommendation:

– to analyse the general security threats and requirements of applications using tag-based identification;

– to analyse the PII threats and requirements between an identification (ID) tag and an ID terminal;

– to analyse the PII threats and requirements depending on the specific ID tagging and reading method, e.g., radio frequency identification (RFID) tag and ID terminal;

– to define and develop the message formats and mechanism for protection of PII based on the user PII policy profile of an application using tag-based identification.

NOTE 1 – Further work will be necessary to define such formats, which may not be restricted to the sole protection of PII of tag-based identification use, but perhaps with a more general (privacy) approach.

In this Recommendation, the ID tag user has the capability for controlling the ID tag itself, and therefore it is assumed that the ID tag user is responsible for the behaviour of the ID tag. NOTE 2 – In some cases, the ID tag user cannot have any capability for controlling the ID tag. For example, someone buys a tagged product and the manufacturer requires the ID tag to remain active for warranty purposes. In this scenario, the ID tag user may be just a person carrying and using the tagged product. Hence, this Recommendation cannot be applied to solve the above problem for this case. This scenario involves some legislation and policy issues (see [b-OECD]) and this issue can be addressed in another Recommendation.


Edition : 09
File Size : 1 file
Number of Pages : 26
Published : 02/01/2009

History


Related products

ITU-T X.613 SPANISH
Published Date: 09/01/1992
TECNOLOGÍA DE LA INFORMACIÓN – UTILIZACIÓN DEL PROTOCOLO DE CAPA DE PAQUETE REC. X.25 JUNTO CON LAS RECS. X.21/X.21 bis PARA PROPORCIONAR EL SERVICIO DE RED EN MODO CONEXIÓN PARA INTERCONEXIÓN DE SISTEMAS ABIERTOS
$7.8
ITU-T I.366.2 FRENCH
Published Date: 11/01/2000
Sous-couche de convergence propre au service de la couche AAL de type 2 pour les services à bande étroite
$33.6
ITU-T G.7712
Published Date: 08/01/2019
Architecture and specification of data communication network
$48.9
ITU-T G.992.5
Published Date: 05/01/2003
Asymmetric Digital Subscriber Line (ADSL) transceivers – Extended bandwidth ADSL2 (ADSL2+) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and digital line system – Access networks
$12.3

Best-Selling Products

Dyeing Primer
Published Date: 01/01/1981
$6