{"id":359012,"date":"2024-10-20T01:24:02","date_gmt":"2024-10-20T01:24:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pas-942013\/"},"modified":"2024-10-26T02:02:52","modified_gmt":"2024-10-26T02:02:52","slug":"bsi-pas-942013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pas-942013\/","title":{"rendered":"BSI PAS 94:2013"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
3<\/td>\nContents <\/td>\n<\/tr>\n
4<\/td>\nForeword <\/td>\n<\/tr>\n
5<\/td>\n0 Introduction <\/td>\n<\/tr>\n
7<\/td>\n1 Scope <\/td>\n<\/tr>\n
8<\/td>\n2 Terms and definitions <\/td>\n<\/tr>\n
9<\/td>\n3 The PIA process
3.1 General
3.2 Outline <\/td>\n<\/tr>\n
10<\/td>\n3.3 Description of the application
3.4 Initial analysis phase <\/td>\n<\/tr>\n
11<\/td>\n3.5 Full-scale PIA process
3.6 Small-scale PIA process
3.7 Risk assessment phase
3.8 Identification of risks
3.9 Deactivation of tags <\/td>\n<\/tr>\n
12<\/td>\n3.10 Identification and recommendation of controls
3.11 Documentation of resolution and residual risks
3.12 PIA report <\/td>\n<\/tr>\n
13<\/td>\n4 The common European RFID notification signage system
4.1 General
4.2 Definition of the common European notification signage system
4.3 The common RFID emblem <\/td>\n<\/tr>\n
14<\/td>\n4.4 Purpose of the application
4.5 Contact point
4.6 Name of the operator of the application <\/td>\n<\/tr>\n
15<\/td>\n4.7 Contact method
4.8 Placement of common European RFID notification signs
4.9 Presence of readers <\/td>\n<\/tr>\n
16<\/td>\n4.10 Presence of tags <\/td>\n<\/tr>\n
17<\/td>\n4.11 Signage on tagged items
4.12 Signage on embedded tags
4.13 Guidelines on additional information <\/td>\n<\/tr>\n
18<\/td>\nAnnex A (informative) Overview of automatic identification and privacy <\/td>\n<\/tr>\n
21<\/td>\nAnnex B (informative) Description of the RFID application <\/td>\n<\/tr>\n
26<\/td>\nAnnex C (informative) Protecting the privacy of the individual: the EC approach to RFID <\/td>\n<\/tr>\n
27<\/td>\nAnnex D (informative) Case studies for the use of RFID notification signage <\/td>\n<\/tr>\n
29<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Implementing privacy impact assessment (PIA) frameworks in radio frequency identification (RFID) applications. Guide<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2013<\/td>\n32<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":359020,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[613,2641],"product_tag":[],"class_list":{"0":"post-359012","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-33-060-99","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/359012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/359020"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=359012"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=359012"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=359012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}