{"id":1473,"date":"2025-07-21T02:17:53","date_gmt":"2025-07-20T22:17:53","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1473"},"modified":"2025-07-21T02:18:57","modified_gmt":"2025-07-20T22:18:57","slug":"iso-iec-291002024","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/ru\/iso-iec-291002024\/","title":{"rendered":"\u0418\u0421\u041e\/\u041c\u042d\u041a 29100:2024"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1473\" class=\"elementor elementor-1473\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b7448c7 e-flex e-con-boxed e-con e-parent\" data-id=\"6b7448c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58e80ef9 e-flex e-con-boxed e-con e-parent\" data-id=\"58e80ef9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a9f2299 elementor-widget elementor-widget-spacer\" data-id=\"5a9f2299\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e96928e e-flex e-con-boxed e-con e-parent\" data-id=\"3e96928e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12bea4aa e-flex e-con-boxed e-con e-parent\" data-id=\"12bea4aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-301357a2 elementor-widget elementor-widget-text-editor\" data-id=\"301357a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"stdTitle\"><span class=\"h4 fw-normal d-block mb-2\">\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 \u2014 \u041c\u0435\u0442\u043e\u0434\u044b \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u2014 \u0421\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438<\/span><\/p><h2>Abstract<\/h2><p>This document provides a privacy framework which:<\/p><p>\u2014\u00a0\u00a0\u00a0 specifies a common privacy terminology;<\/p><p>\u2014\u00a0\u00a0\u00a0 defines the actors and their roles in processing personally identifiable information (PII);<\/p><p>\u2014\u00a0\u00a0\u00a0 describes privacy safeguarding considerations;<\/p><p>\u2014\u00a0\u00a0\u00a0 provides references to known privacy principles for information technology.<\/p><p>This document is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5995c8a4 e-flex e-con-boxed e-con e-parent\" data-id=\"5995c8a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-467e43ef elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"467e43ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-21320-12015\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u041f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0439<\/span><span class=\"post-navigation__prev--title\">\u0418\u0421\u041e\/\u041c\u042d\u041a 21320-1:2015<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-420052025\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><span class=\"post-navigation__next--title\">\u0418\u0421\u041e\/\u041c\u042d\u041a 42005:2025<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 29100:2024 Information technology \u2014 Security techniques \u2014 Privacy framework Abstract This document provides a privacy framework which: \u2014\u00a0\u00a0\u00a0 specifies a common privacy terminology; \u2014\u00a0\u00a0\u00a0 defines the actors and their roles in processing personally identifiable information (PII); \u2014\u00a0\u00a0\u00a0 describes privacy safeguarding considerations; \u2014\u00a0\u00a0\u00a0 provides references to known privacy principles for information technology. This document is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1473","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/comments?post=1473"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1473\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/media?parent=1473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}