{"id":358270,"date":"2024-10-20T01:20:31","date_gmt":"2024-10-20T01:20:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pas-742008\/"},"modified":"2024-10-26T01:54:23","modified_gmt":"2024-10-26T01:54:23","slug":"bsi-pas-742008","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pas-742008\/","title":{"rendered":"BSI PAS 74:2008"},"content":{"rendered":"
This Publicly Available Specification specifies requirements for products, services, tools and other systems that allow UK adult Internet users to easily control children’s access to inappropriate Internet-based content and services.<\/p>\n
It specifies requirements on:<\/p>\n
By using a certified product or service, parents\/carers will have confidence in the ability of the access control system to:<\/p>\n
Furthermore, where the access control system can be installed, parents\/carers will have confidence in their ability to uninstall\/remove the product or service (see Clause 10<\/b>).<\/p>\n
By using a certified product or service, parents\/carers will:<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | Contents Introduction 1 1 Scope 2 2 Terms and definitions 3 3 Abbreviations 6 4 Internet-based content 7 5 Internet-based communications 8 6 Security of settings 10 7 Installation and implementation – including initial configuration 10 8 Configuration 12 9 Maintenance 12 10 Uninstall\/removal 13 11 System support 14 12 Product description and user documentation 14 13 User education materials 17 14 Conformity declaration 18 Annexes Annex A (normative) Overview of the test laboratory process 19 Annex B (normative) Categories of inappropriate content 20 Annex C (normative) Criteria to be used for checking compliance against Clause 4: Internet-based content 23 Annex D (normative) Criteria to be used for checking compliance against Clause 5: Internet-based communications 25 Annex E (normative) Categories of Internet-based communication services 26 Annex F (normative) Criteria to be used for checking compliance against Clause 6: Security of settings 26 Annex G (normative) Criteria to be used for checking compliance against Clause 7: Installation 27 Annex H (normative) Criteria to be used for checking compliance against Clause 8: Configuration 28 Annex I (normative) Criteria to be used for checking compliance against Clause 9: Maintenance 29 Annex J (normative) Criteria to be used for checking compliance against Clause 10: Uninstall\/removal 30 Annex K (normative) Criteria to be used for checking compliance against Clause 11: System support 30 Annex L (normative) Criteria to be used for checking compliance against Clause 12: Product description and user documentation 31 Bibliography 33 <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | 1 Scope a) ease of installation, configuration and use; b) effectiveness; c) minimum features; d) ease of updating; e) quality of instructions; f) consumer communications and support. a) block inappropriate content (see Clause 4); b) block communications via Internet-based services that are inappropriate (see Clause 5); c) prevent unauthorized users from changing or disabling the access control settings (see Clause 6); d) provide an appropriate level of protection (as specified by this PAS) upon implementation\/installation either through the use of default settings or configuration in accordance with user documentation (see Clause 7); e) configure the product or service where such a capability is offered (see Clause 8); f) remain up to date (within the terms of any licensing or subscription requirements) (see Clause 9). <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | a) have confidence in the ability to obtain suitable system support should they encounter problems with implementing, maintaining or installing\/removing the access control system (see Clause 11); b) have confidence in the level and quality of information they will receive in the product description and user documentation p… c) have access to user education materials providing information and links to information that enable parents\/carers and children to stay informed of the issues and risks of using the Internet (see Clause 13). 2 Terms and definitions 2.1 access control system 2.2 blocking 2.3 certification body 2.4 chat 2.5 communication 2.6 content 2.7 email <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 2.8 end user 2.9 filtering 2.10 hate material 2.11 inappropriate content 2.12 inexperienced user 2.13 instant message 2.14 Internet 2.15 Internet Service Provider 2.16 manufacturer 2.17 newsgroup 2.18 overblocking 2.19 parent\/carer <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 2.20 post, posting 2.21 product description 2.22 product packaging 2.23 product\/service type A 2.24 product\/service type B 2.25 racist material 2.26 software product 2.27 system support provider 2.28 system support 2.29 Usenet 2.30 user documentation <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 2.31 user education material 2.32 virus 2.33 web-based chat 2.34 webcam 2.35 web forum 3 Abbreviations 3.1 FAQs 3.2 FTP 3.3 FTPS over SSL 3.4 HTTP 3.5 IRC 3.6 P2P 3.7 PIN 3.8 SSL 3.9 VoIP <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Internet-based content 4.1 General 4.2 Mandatory requirements 4.2.1 Product\/service type A – access control system providing default settings 4.2.2 Product\/service type B – access control system requiring full configuration of settings <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Internet-based communications 5.1 General 5.2 Mandatory requirements 5.2.1 Product\/service type A – access control system providing default settings <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2.2 Product\/service type B – access control system requiring full configuration of settings <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 Security of settings 6.1 General 6.2 Mandatory requirements 7 Installation and implementation – including initial configuration 7.1 General 7.2 Mandatory requirements 7.2.1 Product\/service type A – access control system providing default settings <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.2.2 Product\/service type B – access control system requiring full configuration of settings <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8 Configuration 8.1 General 8.2 Mandatory requirements 9 Maintenance 9.1 General 9.2 Mandatory requirements <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 10 Uninstall\/removal 10.1 General 10.2 Mandatory requirements <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 11 System support 11.1 General 11.2 Mandatory requirements 12 Product description and user documentation 12.1 General <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 12.2 Mandatory requirements 12.2.1 Product description a) information on conformity certifications awarded to the product; b) identification information, including product name, function, date of release and version; c) purpose and field of application; d) operating environment, including hardware, software and communications requirements; e) contents of the package; f) contractual information, including licensing, conditions of use, and financial commitments (e.g. subscriptions, support costs); g) contact details for system support, consumer communications and complaints and times of availability of support; h) information on specifications, standards or laws that have been followed. 12.2.2 User documentation a) a functional description of the access control system; b) clear instructions for the installation of the access control system (where applicable, see 12.2.3); c) clear instructions for the configuration of the access control system (where applicable, see 12.2.3); d) clear instructions for the maintenance of the access control system including anticipated costs; e) clear instructions for testing to ensure that access controls are working correctly; f) clear information on the methods for accessing system support services; g) clear instructions for uninstalling\/removing the access control system; h) a table of contents and index. <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 12.2.3 Installation and configuration instructions for PAS 74 compliance 12.2.3.1 General 12.2.3.2 Product\/service type A – access control system providing default settings <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 12.2.3.3 Product\/service type B – access control system requiring full configuration of settings 13 User education materials 13.1 Mandatory requirements <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 14 Conformity declaration a) the number and date of this Publicly Available Specification, i.e. PAS 74:2007; b) the name or trademark of the software provider; c) where authorized, the mark of a third-party certification body. <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (normative) Overview of the test laboratory process A.1 The laboratory A.2 Test methods A.3 Reporting A.4 Inventory <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex B (normative) Categories of inappropriate content B.1 Adult (sexually explicit) content a) real or simulated sexual intercourse including explicit cartoons or animation; b) depiction of sexual activity involving devices such as sex toys; c) sexual activity with visible pubic areas or genitals; d) threats of sexual violence such as rape; e) excessive use of profanity or obscene gesticulation; f) erotic stories and textual descriptions of sexual acts; g) sexually exploitative or sexually violent text. B.2 Violence (including weapons and bombs) a) portrayal of graphic violence against humans, animals or institutions; b) depictions of torture, mutilation, gore or horrific death; c) content advocating self-endangerment, self-mutilation or suicide, including promotion of eating disorders or addictions; d) graphic violence that in particular dwells on the infliction of pain or injury; e) instructions for making bombs and weapons; f) portrayal and glamorization of easily accessible weapons, e.g. knives; g) content promoting terrorism and terrorist organizations; h) content promoting the use and purchase of weapons, ammunition, explosives, poisons, etc. <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | B.3 Racist and hate material a) content that advocates or incites violence or attack based on religious, racial, ethnic, gender, age, disability, sexual orientation or cultural community grounds; b) content that advocates social intolerance; c) promotion of political agendas based on supremacist, exclusionary, racial, religious, ethnic, gender, age, disability or sexual orientation grounds; d) holocaust denial, revisionist content and other sites encouraging hate; e) militancy and extremist content. B.4 Illegal drug taking and the promotion of illegal drug use a) content promoting, encouraging or instructing on the use of illegal drugs, including the use of tobacco, alcohol and other substances illegal to minors; b) information relating to disguising drug use, including alcohol and tobacco; c) content promoting the sale and distribution of illegal drugs; d) information relating to recipes, manufacturing and growing of illicit substances; e) content promoting and instructing on the use of legal highs and the abuse of other legal substances; f) content promoting and instructing on abuse of prescription drugs. <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | B.5 Criminal skills\/activity a) promoting, instructing and advocating illegal activity; b) providing advice on criminal skills such as lock picking, burglary, fraud, etc.; c) relating to cracked or pirated software distribution; d) relating to the unauthorized distribution of music, videos, fake IDs, etc.; e) promoting, instructing or distributing malicious executable software, viruses, worms, etc.; f) promoting the unauthorized use of, or attempts to circumvent or bypass the security mechanisms of, an information system or network; g) providing information associated to workarounds of the access control system. B.6 Gambling a) online gambling and lottery websites inviting users to risk money or valuables either virtual or real; b) content providing information and advice relating to tips and wagers, bookmaker odds, etc.; c) content promoting methods of gambling, including, but not limited to: 2) sports picks; 3) running numbers; d) online casinos and poker rooms; e) promoting a gambling lifestyle. <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex C (normative) Criteria to be used for checking compliance against Clause 4: Internet-based content <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | a) large portal or umbrella sites that could contain unsuitable materials within their many sub sites but suitable material within other areas of the domain; b) sites with unfortunately spelled names or content where combinations of letters may spell words that could be blocked by a word list; c) educational, government, historical and medical sites that deal with, for example, sex, drugs, violence or racial issues on a serious basis; d) some well known children\u2019s and social networking sites. a) this action is secure (e.g. password protected); b) under default conditions it will automatically revert to filtered performance after a specified time or period of inactivity. <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex D (normative) Criteria to be used for checking compliance against Clause 5: Internet-based communications <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex E (normative) Categories of Internet-based communication services a) Email; b) Instant messaging clients; c) Usenet Newsgroups; d) File Transfer Protocol (FTP) and Secure File Transfer Protocol (FTPs); e) Peer to Peer (P2P) file sharing; f) Internet Relay Chat (IRC); g) Web-based chat and web forums; h) Webcam programs; i) Voice over IP (VoIP) programmes and utilities. Annex F (normative) Criteria to be used for checking compliance against Clause 6: Security of settings <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex G (normative) Criteria to be used for checking compliance against Clause 7: Installation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex H (normative) Criteria to be used for checking compliance against Clause 8: Configuration <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex I (normative) Criteria to be used for checking compliance against Clause 9: Maintenance <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex J (normative) Criteria to be used for checking compliance against Clause 10: Uninstall\/removal Annex K (normative) Criteria to be used for checking compliance against Clause 11: System support K.2.1 Phone <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | K.2.2 Email a) if requested amendments are implemented within the supplier\u2019s specified response time in the case of accepted amendments; b) that a notification is received within the supplier\u2019s specified response time in the case of rejected amendments. Annex L (normative) Criteria to be used for checking compliance against Clause 12: Product description and user documentation <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Bibliography [1] BS ISO\/IEC 18019:2004, Software and system engineering. Guidelines for the design and preparation of user documentation for application software [2] BS 7137:1989, Specification for user documentation and cover information for consumer software packages <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Internet safety. Access control systems for the protection of children online. Specification<\/b><\/p>\n |