{"id":359012,"date":"2024-10-20T01:24:02","date_gmt":"2024-10-20T01:24:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pas-942013\/"},"modified":"2024-10-26T02:02:52","modified_gmt":"2024-10-26T02:02:52","slug":"bsi-pas-942013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pas-942013\/","title":{"rendered":"BSI PAS 94:2013"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | 0 Introduction <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 2 Terms and definitions <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 3 The PIA process 3.1 General 3.2 Outline <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3.3 Description of the application 3.4 Initial analysis phase <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.5 Full-scale PIA process 3.6 Small-scale PIA process 3.7 Risk assessment phase 3.8 Identification of risks 3.9 Deactivation of tags <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3.10 Identification and recommendation of controls 3.11 Documentation of resolution and residual risks 3.12 PIA report <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 The common European RFID notification signage system 4.1 General 4.2 Definition of the common European notification signage system 4.3 The common RFID emblem <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.4 Purpose of the application 4.5 Contact point 4.6 Name of the operator of the application <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.7 Contact method 4.8 Placement of common European RFID notification signs 4.9 Presence of readers <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.10 Presence of tags <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.11 Signage on tagged items 4.12 Signage on embedded tags 4.13 Guidelines on additional information <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Annex A (informative) Overview of automatic identification and privacy <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex B (informative) Description of the RFID application <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex C (informative) Protecting the privacy of the individual: the EC approach to RFID <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex D (informative) Case studies for the use of RFID notification signage <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Implementing privacy impact assessment (PIA) frameworks in radio frequency identification (RFID) applications. Guide<\/b><\/p>\n |