Iso TR 12859-2009
Iso TR 12859-2009
REPORT 12859
First edition
2009-06-01
--`,,```,,,,````-`-`,,`,,`,`,,`---
Reference number
ISO/TR 12859:2009(E)
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
--`,,```,,,,````-`-`,,`,,`,`,,`---
ii
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
Contents Page
Foreword ............................................................................................................................................................iv
Introduction.........................................................................................................................................................v
1 Scope ......................................................................................................................................................1
2 Terms, definitions and abbreviated terms ..........................................................................................1
2.1 Terms and definitions ...........................................................................................................................1
2.2 Abbreviated terms .................................................................................................................................2
3 Background............................................................................................................................................2
3.1 Origin and basis of this Technical Report ..........................................................................................2
3.2 Privacy requires security......................................................................................................................3
3.3 The investigative process.....................................................................................................................3
4 Recommendations ................................................................................................................................5
4.1 Basis of recommendations...................................................................................................................5
4.2 Avoidance of harm ................................................................................................................................5
4.3 Fairly and lawfully .................................................................................................................................5
4.4 Specified, explicit and legitimate purposes........................................................................................5
4.5 Explicit and legitimate and must be determined at the time of collection of the data ...................5
4.6 Not further processed in a way incompatible with the purposes for which they are
originally collected ................................................................................................................................5
4.7 Not to be disclosed without the consent of the data subject ...........................................................6
4.8 Adequate, relevant and not excessive in relation to the purposes for which they are
collected .................................................................................................................................................6
4.9 Accurate and, where necessary, kept up to date ...............................................................................6
4.10 Identification of data subjects for no longer than is necessary for the purposes for which
the data were collected .........................................................................................................................6
4.11 Restriction to those who have a demonstrable “need to know”......................................................6
4.12 Clear and accessible .............................................................................................................................7
4.13 Security safeguards ..............................................................................................................................7
4.14 Cumulative interpretation of multiple recommendations .................................................................7
Annex A (informative) Data privacy Framework, Directives and Guidelines................................................8
Annex B (informative) Example of national implementation of guidelines...................................................9
Annex C (informative) Examples of the principle of “cumulative interpretation”......................................11
Annex D (informative) Security-related International Standards .................................................................14
Bibliography......................................................................................................................................................17
--`,,```,,,,````-`-`,,`,,`,`,,`---
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In exceptional circumstances, when a technical committee has collected data of a different kind from that
which is normally published as an International Standard (“state of the art”, for example), it may decide by a
simple majority vote of its participating members to publish a Technical Report. A Technical Report is entirely
informative in nature and does not have to be reviewed until the data it provides are considered to be no
longer valid or useful.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/TR 12859 was prepared by Technical Committee ISO/TC 204, Intelligent transport systems.
--`,,```,,,,````-`-`,,`,,`,`,,`---
iv
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
Introduction
Intelligent transport systems (ITS) are intrinsically linked to the movement and exchange of data. Some of
these data are purely situational or anonymous, however several, either by themselves or as part of multiple
data concepts, which independently can be purely situational or anonymous, taken together can provide
personal information.
In the modern world, it is often neither possible nor desirable for information to always be anonymous,
therefore, the privacy of data is protected around the world by data privacy and data protection regulations.
While the evolution and development of ITS technology provides many opportunities for the provision of
increasingly sophisticated ITS services mostly designed for the benefit of users, when designing ITS systems
and standards it is imperative that, as part of the fundamental design, the legal and moral requirements for the
privacy and protection of data be taken into account at an early stage of system design. This is not only
desirable from a moral point of view, but is required in order for a system or standard to be legally compliant.
This means taking into consideration not only the potential use, but also protection against misuse of data in a
system.
Specific data privacy protection legislation is generally achieved through national legislation and this varies
from country to country. The general principles are geographically common, however, and due to provisions
made by trading blocks such as the European Union and APEC, there are many universal aspects to data
privacy and data protection.
--`,,```,,,,````-`-`,,`,,`,`,,`---
Users tend to interpret these guidelines in the context of their national laws. For users in EU member states,
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of
individuals with regard to the processing of personal data and on the free movement of such data and its
successive instruments are mandatory within these states. International courts are likely to give precedence to
a combination of the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
(OECD Guidelines) and either Directive 95/46/EC or the APEC Privacy Framework, as appropriate.
Using the guidelines espoused by Directive 95/46/EC, the APEC Privacy Framework and the OECD
Guidelines, this Technical Report provides guidance to developers of ITS standards and systems on general
data privacy and protection aspects for the fundamental architecture and design of all ITS standards, systems
and implementations.
1 Scope
This Technical Report gives general guidelines to developers of intelligent transport systems (ITS) standards
and systems on data privacy aspects and associated legislative requirements for the development and
revision of ITS standards and systems.
For guidance on specific data protection and data privacy requirements on the subject of ITS probe data, see
ISO 241001).
2.1.1
accountability
responsibility for complying with measures, making compliance evident, and the associated required
disclosures
--`,,```,,,,````-`-`,,`,,`,`,,`---
2.1.2
collection limitation
limit to the collection of personal data
2.1.3
data protection
use of means such as legal safeguards to prevent the misuse of information stored on computers, particularly
information about individual people
2.1.4
data quality
standard of acceptability of accuracy of personal data
2.1.5
individual participation
right of an individual to have access to personal data held about the individual and the ability to challenge and
correct such data
2.1.6
openness
policy of openness about developments, practices and policies with respect to personal data
1) To be published.
2.1.7
personal data
data about a living individual, identified or identifiable, as determined by the privacy laws and conventions of a
political jurisdiction
2.1.8
personal information controller
entity or organization that controls the collection, holding, processing or use of personal information
2.1.9
privacy
quality of being secluded from the presence or view of others
2.1.10
purpose specification
purpose for which personal data are collected
2.1.11
security safeguard
safeguard against such risks as loss or unauthorized access, destruction, use, modification or disclosure of
data
2.1.12
use limitation
limit to the purposes for which personal data can be used
NOTE This is the group of Pacific Rim countries that meet with the purpose of improving economic and political ties.
NOTE This organization promotes stable economic growth in its member states and provides advice to other
--`,,```,,,,````-`-`,,`,,`,`,,`---
countries.
EU European Union
NOTE This is the union with economic, monetary and political ties and intergovernmental coordination of foreign and
security policies among 27 European member states.
3 Background
This Technical Report originated from discussions in ISO/TC 204 and CEN TC 278, subsequent to legal
studies undertaken in Austria concerning the use of personal data in ITS. The pressure for business case
justification initially sustains such developments without a clear legal position and it is necessary to consider
the technical and engineering possibilities, as well as ensure that they evolve within a framework of generally
(internationally) accepted data protection principles and of course within national data protection legislation.
This Technical Report attempts to create the necessary nexus for intelligent infrastructure systems and
provide for their implementation to the greatest extent possible. It attempts to serve as a scientifically based
study and a practical handbook. It includes the consideration of a representative selection of technical
“scenarios”, as well as a comprehensive and detailed account of the most important applicable legal areas.
2
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
There are now data privacy and data protection laws in most countries, therefore it is not possible to take
every provision in each country into account. Rather, the recommendations of this Technical Report provide
general guidelines which the user should use for general guidance within the context of the national legislation
of an implementation (which takes precedence). Developers of standards should test the basic architecture
and concept design of their standards against the recommendations in this Technical Report. For an example
of national implementation of guidelines, see Annex B.
The recommendations in Clause 4 take the form of a checklist of features to be consulted when developing a
standard or an implementation. This Technical Report does not attempt to interpret the reference documents
in Annex A. Where further information is required, see Annex A for the references to the sources.
The recommendations given in this Technical Report are based on the APEC Privacy Framework, Directive
95/46/EC, Directive 2002/58/EC and the OECD Guidelines, instruments which cover most of the world.
NOTE While the OECD Guidelines and the APEC Privacy Framework are policy instruments which are advisory in
nature, Directive 95/46/EC is mandatory for EU countries.
Most countries have pledged to use these instruments, along with specific national legislation, to implement
basic principles of data privacy and protection of data held on individual persons. Although they vary in detail,
the general principles are common and originate with the OECD Guidelines. Directive 95/46/EC is more
specific, has more protection requirements and is mandatory for EU member states.
Privacy is required in ITS services and this involves following recognized and secure operations. Although this
Technical Report does not specify such means, the following aspects should be considered (see references in
Annex A).
Special attention should be given to the processing, transmission and storage of information, with authorized
access for approved users and potential information flows with external entities which might get involved.
Moreover, in the ITS context, cooperation among the various organizations acquiring the information is often
expected, in order to promote the exchange of data with the aim of improving functionalities in several ITS
service domains. In this case, the comprehension of other particular requirements and interfaces which are
often under undefined responsibilities also needs to be assessed in terms of security risks and possible
threats to privacy.
Where appropriate, it is recommended that the guidelines defined for the management of information security
in accordance with the ISO/IEC 27000 series of International Standards, with special reference to
ISO/IEC 27002, be followed. The recommendations for the management of communications and operations or
the measures taken in relation to the access control and privileges for authorized users should also be
followed.
There are a number of security-related International Standards (including the ISO/IEC 27000 series) which
can assist in the achievement of privacy (see Annex D).
Some examples are provided in this subclause to highlight data protection and data privacy aspects where
existing law should be taken into consideration in the design of systems and standards. This Technical Report
encourages an attitude of thinking similar to the specific recommendations implied by the APEC Privacy
Framework, Directive 95/46/EC, Directive 2002/58/EC and the OECD Guidelines.
Firstly, certain significant technical scenarios were studied as examples in order to get an overview of the
existing developmental situation. These are examples and do not purport to cover all ITS scenarios. Parallel to
this, legal areas within public law, civil law and data privacy law are considered.
The results are quite interesting and important in terms of the legal implications, therefore, the most important
results are briefly summarized for each scenario investigated.
Copyright International Organization for Standardization© ISO 2009 – All rights reserved 3
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
For instance problems with data privacy laws might exist in many countries in terms of the installation of traffic
monitoring cameras which can identify individual vehicle characteristics. In terms of civil law, it is advisable to
clearly stipulate responsibilities concerning liability issues in regard to control units.
The issue of floating car systems is also relevant to basic fundamentals concerning the rights of the common
person. It is the duty of the federal state to make sure that the rights of its citizens are not disproportionately
limited. This problem, in regard to civil law, is also reflected in labour laws. The employer has to take the
interests of his employees' protection into consideration. In some cases, the agreement of the workers' council
is necessary.
Some parking schemes also raise concern because they save information related to mobile telephone
numbers, license and registration numbers, bank accounts and names during the payment mode. It appears
that the present payment methods are not in compliance with legal requirements for constitutional equality.
Regarding traffic monitoring in public areas, unequal treatment is to be avoided. For example cars that are
equipped with monitoring chips should not be monitored more frequently than cars without chips.
Constitutional rights of freedom of movement are the most difficult in terms of legal data privacy
--`,,```,,,,````-`-`,,`,,`,`,,`---
considerations. For example within the European legislative framework, the Austrian investigation reached the
opinion that road users have the constitutional right to travel freely in the public infrastructure network free
from national monitoring. If monitoring is in the form of random sampling, the use of personal data can be
justified if it increases safety in society, but only as long as no data is saved.
In terms of digital license plate numbers, the Austrian investigation concluded that privacy aspects need to be
considered and specified in production specifications, and the specific terms of safety standards and liability
determined in the case of injury and owed diligence, in particular between suppliers and system operators,
and should be specified in terms of written contracts.
Another example involves the temporary opening of a motorway emergency lane and entrance controls on
motorway ramps. When monitoring the emergency lane in all areas, issues about the data security of video
cameras are important.
In the opinion of the Austrian investigation, the level of accepted prudence is potentially problematic in terms
of civil law systems to reduce accident risks [e.g. intelligent speed adaptation (ISA), dynamic warnings,
adaptive cruise control (ACC) and systems to avoid collisions].
Finally, questions are raised by the Austrian investigation concerning accident data loggers (UDS) and
mayday systems. Two vehicles, one equipped with UDS and one without, should not be next to each other.
UDS systems should save data in short intervals. Consideration for human dignity should also be made when
using information from UDS systems.
On the one hand, this Technical Report demonstrates the “need to catch up” in the sense of legal aspects, but
on the other hand, the Austrian study also highlights the legal inadmissibility of certain systems (at least within
a European member state). Nevertheless, this Technical Report is designed to make the implementation of
such systems possible and to help create legal clarity in the economic arena in order to achieve the necessary
and important developments towards intelligent infrastructure.
The recommendations in this Technical Report are based on identified existing legal positions for each case,
in order to ponder existing problems and to state needs for adaptation (de lege lata). A set of solutions (de
lege ferenda) is discussed with the aim of reducing or eliminating these problems. The goal is to enable the
implementation of these systems to the greatest extent possible; nevertheless the limits of these technical
developments (constitutional and/or international law) should be shown and are shown. Furthermore, this
Technical Report attempts to formulate basic principles from each aspect by establishing a (legally motivated)
understanding of terms for intelligent infrastructure. Finally, based on these terms, the subjects are arranged
based on their probable significance in legal order.
4
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
4 Recommendations
This Technical Report proposes adherence to the following general principles for data protection and privacy
of data relating to personal information concerning individuals.
The conditions under which data are collected and held in support or provision of ITS services should uphold
all of the following principles.
Data protection and privacy of data should recognize the interests of the individual to legitimate expectations
of privacy, personal information protection and should be designed to prevent the misuse of such information.
Further, acknowledging the risk that harm can result from such misuse of personal information, specific
obligations should take account of such risk, and remedial measures should be proportionate to the likelihood
and severity of the harm threatened by the collection, use and transfer of personal information.
All personal data should be obtained and processed fairly and lawfully.
(APEC Privacy Framework, Part iii, I; Directive 95/46/EC, Chapter 3, Article 5; OECD Guidelines, Part 2, 7)
All personal data should be collected for specified, explicit and legitimate purposes.
[APEC Privacy Framework, Part ii (Cl.13); Part iii (Cl. 1); Directive 95/46/EC, Section 2, Article 7, 7.14.1.1
Cl. 29, 30, 45, 51, 59; 7.19.5 (b); 7.19.7; OECD Guidelines, Cl. 7, 8]
4.5 Explicit and legitimate and must be determined at the time of collection of the data
The purposes for which personal data are collected should be determined at the time of the collection of the
data, should be explicit and legitimate at the time of collection of the data and use of the data limited to the
fulfilment of those purposes (or such others as are not incompatible with those purposes specified); the
subsequent use should also be limited to the fulfilment of those purposes (or such others as are not
incompatible with those purposes). All personal data collected should be adequate, relevant and not
excessive in relation to the purposes for which they are processed.
[APEC Privacy Framework, 7.14.11 Cl. 28, 56,57; 7.19.5 (c); OECD Guidelines, Part 2. Cl. 9]
4.6 Not further processed in a way incompatible with the purposes for which they are
originally collected
All personal data should not be further processed or used in a way incompatible with the purposes for which
they are originally collected.
[Directive 95/46/EC, 7.14.1.1 Cl. 28, 29; 7.19.5 (b); 7.40.1 (2); OECD Guidelines, Part 1, Cl. 9, 24]
--`,,```,,,,````-`-`,,`,,`,`,,`---
Personal data should not be disclosed, made available or otherwise used for purposes other than those
specified in accordance with 4.4, except 4.7 a) or b):
a) where the data subject has freely and unambiguously given his/her consent;
⎯ for the performance of a contract to which the data subject is party or in order to take steps at the request
of the data subject prior to entering into a contract;
⎯ for the performance of a task carried out in the public interest or in the exercise of official authority vested
in the controller or in a third party to whom the data are disclosed;
⎯ for the purposes of the legitimate interests pursued by the controller or by the third party or parties to
whom the data are disclosed, except where such interests are overridden by the interests for fundamental
rights and freedoms of the data subject defined above.
[Directive 95/46/EC, Cl. 28, Cl. 30 and section D11, Cl. 7.19.13 2 d); OECD Guidelines, Part 1, Cl. 10; OECD
Guidelines, Part 2, Cl. 9; APEC Privacy Framework, Part iv, Cl. 29]
4.8 Adequate, relevant and not excessive in relation to the purposes for which they are
collected
All personal data should be adequate, relevant and not excessive in relation to the purposes for which they
are collected and/or further processed.
[Directive 95/46/EC, Cl. 28, Cl. 30 and section D11, Cl7.19.13 2 d); OECD Guidelines, Part 1, Cl.10; OECD
Guidelines, Part 2, Cl. 9; APEC Privacy Framework, Part iv, Cl. 29]
All personal data should be accurate and, where necessary, kept up to date; every reasonable step should be
taken to ensure that data which are inaccurate or incomplete, having regard to the purposes for which they
were collected or for which they are further processed, are erased or rectified.
(APEC Privacy Framework, v1, Cl. 21; Directive 95/46/EC, section 1. 7.19.5; OECD Guidelines, Part 1, Cl. 8)
4.10 Identification of data subjects for no longer than is necessary for the purposes for
which the data were collected
All personal data should be kept in a form which permits identification of data subjects for no longer than is
necessary, for the purposes for which the data were collected or for which they are further processed.
Access to personal data should be restricted to the minimum number of persons who have a demonstrable
“need to know”.
6
--`,,```,,,,````-`-`,,`,,`,`,,`---
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
EXAMPLE In a situation where a law of the land has been allegedly infringed, an enforcement officer should have
access only to information necessary to enforce and not all information pertaining to the individual subject, his ownership
of vehicles or other personal data. That information can, for example only identify a vehicle and this data can be handed
over to a prosecution system. A national prosecution service would, of course, require access to a great deal of
information concerning the accused person in order to effect a prosecution, but all of this information should not be
available to all enforcement officers and should not be made available without a justifiable need to know.
The structure of systems and standards architecture for ITS should be constructed to enable the use of data
to be restricted to those who have a genuine need to know.
Personal information controllers should provide clear and easily accessible statements about their practices
and policies with respect to personal information, which should include:
d) the identity and location of the personal information controller, including information on how to contact
them about their practices and handling of personal information.
(APEC Privacy Framework, Part iii, Cl.15 and 20; Directive 95/46/EC, 7.9.1.2;)
Personal data should be protected by reasonable security safeguards against such risks as loss or
unauthorized access, destruction, use, modification or disclosure of data.
(APEC Privacy Framework, Part iii, vii, Cl. 22; OECD Guidelines, Part 2, Cl. 11)
In the development of ITS systems and standards, legislators and lawyers advise that the recommendations
cannot just be taken individually, in isolation, but must also be viewed as a whole; this approach, which
lawyers often refer to as “cumulative interpretation”, can lead to different interpretations, and this has
significant implications. Examples are provided in Annex C.
--`,,```,,,,````-`-`,,`,,`,`,,`---
Annex A
(informative)
The references used for this Technical Report are the following:
http://www.dpmc.gov.au/privacy/apec/apec_privacy_framework.cfm or
http://epic.org/redirect/apf12407.html;
b) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection
of individuals with regard to the processing of personal data and on the free movement of such data
http://eur-
lex.europa.eu/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=en&numdoc=31995L004
6&model=guichett;
c) Directive 2002/58/EC of The European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of privacy in the electronic communications sector
(Directive on privacy and electronic communications)
http://eur-
lex.europa.eu/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&numdoc=32002L0058&mod
el=guichett&lg=en;
d) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html.
--`,,```,,,,````-`-`,,`,,`,`,,`---
8
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
Annex B
(informative)
B.1 Implementation of Directive 95/46/EC, Directive 2002/58/EC and the OECD Guidelines will vary
according to the structure and practices of different regimes. As an example of the implementation of the
APEC Privacy Framework, this annex shows some of the ways that a country (USA) is implementing it.
USNB Privacy Act provisions to make this Technical Report applicable to the USNB. The NIST Special
--`,,```,,,,````-`-`,,`,,`,`,,`---
Publication 800-12 Handbook provides guidelines for security planning and privacy protection within the
security planning process.
c) the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule;
p) NIST Special Publication 800-12, An Introduction to Computer Security: The NIST Handbook
http://crsc.nist.gov/publications/nistpubs/800-12/handbook.pdf
B.1.2 The following are the principles extracted from the OECD Guidelines and US DHEW:
a) lawful purpose: personal information should be collected only for lawful purposes;
b) relevance: information should be collected only if it is relevant for the purpose for which it is collected;
c) primary use: information should be used only for the purpose for which it was collected;
f) completeness: incomplete information should not be kept, especially if the incompleteness is misleading;
g) access: data subjects should have access to information about themselves, and should be able to
challenge and correct it;
h) security: information should be protected against unauthorized loss, alteration, or disclosure, both internal
and external to the data collector; sensitive data requires greater protection;
i) transparency: the existence of a database containing personal information should not be secret;
10
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
Annex C
(informative)
As an example of the likely legal interpretations of Directive 95/46/EC, Directive 2002/58/EC and the APEC
Privacy Framework, as well as the principle of “cumulative interpretation” (while recognizing that practices
vary from country to country), if several articles of Directive 95/46/EC are compared, a “cumulative implication”
on the use of data and the purposes for which it might be used can be seen. The example used in this annex
is Directive 95/46/EC. However, the principle of “cumulative interpretation” described is just as applicable to
the clauses of the APEC Privacy Framework or the OECD Guidelines (of course, Directive 95/46/EC has
stronger legal requirement in Europe).
The preamble states: “Whereas the object of the national laws on the processing of personal data is to protect
fundamental rights and freedoms, notably the right to privacy, which is recognized both in Article 8 of the
Convention for the Protection of Human Rights and Fundamental Freedoms and in the general principles of
Community law; whereas, for that reason, the approximation of those laws must not result in any
lessening of the protection they afford but must, on the contrary, seek to ensure a high level of protection
in the Community;” (highlighted in bold in this Technical Report).
The fundamental rights and freedoms of a person have therefore to be defined from two viewpoints:
This can be interpreted to mean that the rights and the freedoms of a person are extendable or limited to the
point at which they impact the freedoms of others. At this point of interference there has to be a weighting of
the freedoms and rights of third parties. However, this is not well defined in any documentation, but will
eventually be solved in the courts. The objective of this Technical Report is to try to avoid these situations in
the first place.
If a person gives higher weight to his/her interests and rights compared to the interests and rights of another,
then the rights of that person should take precedence. This interpretation is supported by the sentence: “the
approximation of those laws must not result in any lessening of the protection they afford but must, on the
contrary, seek to ensure a high level of protection in the Community”.
Clause 31 states: “Whereas the processing of personal data must equally be regarded as lawful where it is
carried out in order to protect an interest which is essential for the data subject's life;”.
An “interest which is essential for the data subject's life” can only be derived from the standpoint of the subject
of the data and not from the standpoint of the controller.
The preamble states: “Whereas, in cases where data might lawfully be processed on grounds of public
interest, official authority or the legitimate interests of a natural or legal person, any data subject should
nevertheless be entitled, on legitimate and compelling grounds relating to his particular situation, to
object to the processing of any data relating to himself; whereas Member States may nevertheless lay
down national provisions to the contrary;” (highlighted in bold in this Technical Report).
This restriction of processing data again supports the view that data can only be collected for the benefit of
and in favour of the subject of the data.
However, the statement “whereas Member States may nevertheless lay down national provisions to the
contrary” is potentially contradictory and WP29 have been asked to make a ruling on whether a member state
may pass domestic legislation specifically designed to overrule the rights provided by the Directive, or whether
--`,,```,,,,````-`-`,,`,,`,`,,`---
this statement only applies to national legislation for a different purpose which can impact on the rights of the
individual for issues of overriding precedence, for example national security.
Article 2 (h) states: “the data subject's consent' shall mean any freely given specific and informed indication of
his wishes by which the data subject signifies his agreement to personal data relating to him being processed”.
This also implies interpretation in favour of the data subject. Combined with: “The purposes for which
personal data are collected shall be determined at the time of the collection of the data and shall be explicit
and legitimate at the time of collection of the data and use of the data limited to the fulfilment of those
purposes” (OECD and codified in Article 11 of the Directive).
--`,,```,,,,````-`-`,,`,,`,`,,`---
The implication of the two clauses is more powerful than the import of each of the specific clauses individually.
It implies the preclusion of the use of data collected for purpose a) or purpose b), without the express consent
of the person who is the subject of the data and requires not only active consent, but permission given at the
time of or prior to data collection. The consent should also be truly optional. Therefore, the use of data such as
vehicle owner databases of vehicle manufacturers or vehicle registration databases of vehicle
licensing/registration authorities, is very limited.
Article 7 (f) states: “processing is necessary for the purposes of the legitimate interests pursued by the
controller or by the third party or parties to whom the data are disclosed, except where such interests are
overridden by the interests for fundamental rights and freedoms of the data subject which require
protection under Article 1 (1).” (highlighted in bold in this Technical Report).
The last part of the sentence restricts the rights of the controller or third parties. The interests of the controller
or any third party are clearly restricted by the fundamental rights and freedoms of the data subject. This again
provides strong support of the interpretation in favour of the data subject.
Article 10 states: “the controller or his representative must provide a data subject from whom data relating to
himself are collected” (with a list of specific information about the controller).
Article 11 states: “Where the data have not been obtained from the data subject, Member States shall provide
that the controller or his representative must at the time of undertaking the recording of personal data or if a
disclosure to a third party is envisaged, no later than the time when the data are first disclosed provide the
data subject with at least the following information, except where he already has it:
⎯ the existence of the right of access to and the right to rectify the data concerning him.
in so far as such further information is necessary, having regard to the specific circumstances in which the
data are processed, to guarantee fair processing in respect of the data subject.” (highlighted in bold in this
Technical Report).
Articles 10 and 11 define the data subject's right to information and correction and deletion of the data if his
data are processed. These are again strong indications of the interpretation in favour to the data subject.
Article 13, paragraph 2 states: “Subject to adequate legal safeguards, in particular that the data are not
used for taking measures or decisions regarding any particular individual, Member States may, where
there is clearly no risk of breaching the privacy of the data subject, restrict by a legislative measure the
rights provided for in Article 12 when data are processed solely for purposes of scientific research or are kept
12
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
in personal form for a period which does not exceed the period necessary for the sole purpose of creating
statistics.” (highlighted in bold in this Technical Report).
The phrase: “… in particular that the data are not used for taking measures or decisions regarding any
particular individual” is a technical measure of restraint in the use of data, but again can be interpreted as
strong indications of the interpretation in favour of the data subject.
The phrase: “... where there is clearly no risk of breaching the privacy of the data subject” is a restriction of the
view and interests of the controller or any third party interested in the processing of personal data.
It is not the intention of this Technical Report to extend privacy requirements for ITS systems and standards
beyond the existing legal requirements or guidelines. However, it is advised that the principle of “cumulative
interpretation of multiple recommendations” is a legal implication that should be taken into account. This issue
is raised in the provision of guidance, in respect of privacy aspects to be considered in ITS systems and
standards, as they can appear in court decisions and national legislation. In terms of the example given in this
annex, in the Austrian Data Protection Act, this cumulative interpretation rule is more strongly expressed by
the wording “überwiegende Interessen” which means vast (or greater) interest (of the person who is the
subject of the data).
Developers of ITS systems and standards should therefore consider not only the individual recommendations
or requirements, but also the combination of recommendations or requirements and the implications of a
consistent view of the specific purpose and use of data concerning privacy. All standards development and
system implementation design should take into account, not only the individual recommendations or
requirements, but also the effect of cumulative interpretation.
13
--`,,```,,,,````-`-`,,`,,`,`,,`---
Annex D
(informative)
ISO/IEC 17799, which establishes guidelines and general principles for initiating, implementing, maintaining
and improving information security management in an organization. The objectives outlined provide general
guidance on the commonly accepted goals of information security management. ISO/IEC 17799 contains best
practices of control objectives and controls in the following areas of information security management:
⎯ security policy;
⎯ asset management;
⎯ access control;
⎯ compliance.
The control objectives and controls in ISO/IEC 17799 are intended to be implemented to meet the
requirements identified by a risk assessment. ISO/IEC 17799 is intended as a common basis and practical
guideline for developing organizational security standards and effective security management practices and
helping to build confidence in inter-organizational activities.
ISO/IEC 18028 (all parts) defines techniques for securing inter-network connections that are established using
virtual private networks (VPNs). It is relevant to all personnel who are involved in the detailed planning, design
and implementation of VPN security (for example IT network managers, administrators, engineers, and IT
network security officers).
The general objective of ISO/IEC 18028 (all parts) is to extend the security management guidelines provided
in ISO/IEC 13335-1 and ISO/IEC 17799, by detailing the specific operations and mechanisms needed to
implement network security controls in a wider range of network environments, providing a bridge between
general IT security management issues and network security technical implementations.
ISO/IEC 18028-1 provides detailed guidance on the security aspects of the management, operation and use
of IT networks and their interconnections.
--`,,```,,,,````-`-`,,`,,`,`,,`---
14
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
ISO/IEC 18028-5 provides detailed guidance on the security aspects of the management, operation and use
of IT networks and their interconnections. The objective of ISO/IEC 18028-5 is to provide support service to
different organizations, IT network managers, administrators, technicians and IT security officers in choosing
the appropriate VPN solution. It defines techniques for securing inter-network connections that are established
using VPNs. It is relevant to all personnel who are involved in the detailed planning, design and
implementation of VPN security (for example IT network managers, administrators, engineers and IT network
security officers). ISO/IEC 18028-5 describes general principles of organization, structure, framework and
usage of a VPN. It discusses functional areas, standards used and network protocols, the various types of
VPNs and their respective requirements and characteristics.
ISO/IEC 27001 covers all types of organizations (e.g. commercial enterprises, government agencies and
non-profit organizations). It specifies the requirements for establishing, implementing, operating, monitoring,
reviewing, maintaining and improving a documented information security management system (ISMS) within
the context of the organization's overall business risks. It specifies requirements for the implementation of
security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001 is
designed to ensure the selection of adequate and proportionate security controls that protect information
assets and give confidence to interested parties. It is intended to be suitable for the following:
b) use within organizations as a way to ensure that security risks are cost effectively managed;
d) use within organizations as a process framework for the implementation and management of controls to
ensure that the specific security objectives of the organizations are met;
g) use by the management of organizations to determine the status of information security management
activities;
h) use by the internal and external auditors of organizations to determine the degree of compliance with the
policies, directives and standards adopted by an organization;
i) use by organizations to provide relevant information about information security policies, directives,
standards and procedures to trading partners and other organizations with whom they interact for
operational or commercial reasons;
The technical content of ISO/IEC 27002 is identical to that of ISO/IEC 17799. ISO/IEC 27002 establishes
guidelines and general principles for initiating, implementing, maintaining and improving information security
management in an organization. The objectives outlined provide general guidance on the commonly accepted
goals of information security management. It contains best practices of control objectives and controls in the
--`,,```,,,,````-`-`,,`,,`,`,,`---
⎯ security policy;
⎯ asset management;
Copyright International Organization for Standardization © ISO 2009 – All rights reserved 15
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
⎯ access control;
⎯ compliance.
The control objectives and controls in ISO/IEC 27002 are intended to be implemented to meet the
requirements identified by a risk assessment. ISO/IEC 27002 is intended as a common basis and practical
guideline for developing organizational security standards and effective security management practices and to
help build confidence in inter-organizational activities.
ISO/IEC 270032) — at the time of development of this Technical Report, this document is at Committee Draft
status.
ISO/IEC 270043) — at the time of development of this Technical Report, this document is at Committee Draft
status.
ISO/IEC 27005 provides guidelines for information security risk management. It supports the general concepts
specified in ISO/IEC 27001 and is designed to assist in the satisfactory implementation of information security,
based on a risk management approach. Knowledge of the concepts, models, processes and terminologies
described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005.
ISO/IEC 27005 is applicable to all types of organizations (e.g. commercial enterprises, government agencies
and non-profit organizations), which intend to manage risks that could compromise the organization's
information security.
ISO/IEC 27006 specifies requirements and provides guidance for bodies providing audit and certification of an
ISMS, in addition to the requirements specified in ISO/IEC 17021 and ISO/IEC 27001. It is primarily intended
to support the accreditation of certification bodies providing ISMS certification. The requirements contained in
ISO/IEC 27006 need to be demonstrated in terms of competence and reliability by any body providing ISMS
certification and the guidance given in ISO/IEC 27006 provides additional interpretation of these requirements
for any body providing ISMS certification.
ISO 24100 states the basic rules to be observed by service providers who handle personal data in probe
vehicle information services. It is aimed at protecting personal data as well as the intrinsic rights and interests
of probe data senders, i.e. owners and drivers of vehicles fitted with in-vehicle probe systems.
ISO 24100 specifies reference architecture for probe vehicle systems, a definition of personal data included in
probe vehicle systems and the basic principles for personal data protection in probe vehicle systems.
Legislation and standards are being developed to support what is called “lawful intercept” and data retention
for law enforcement, which adversely impact aspects of the privacy of personal data.
2) To be published.
3) To be published.
16
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
Bibliography
[1] ISO 24100, Privacy — The basic principles for probe personal data protection
[2] ISO/IEC 13335-1, Information technology — Security techniques — Management of information and
communications technology security — Part 1: Concepts and models for information and
communications technology security management
[3] ISO/IEC 17021, Conformity assessment — Requirements for bodies providing audit and certification of
management systems
[4] ISO/IEC 17799, Information technology — Security techniques — Code of practice for information
security management
[5] ISO/IEC 18028 (all parts), Information technology — Security techniques — IT network security
[6] ISO/IEC 27000, Information technology — Security techniques — Information security management
systems — Overview and vocabulary
[7] ISO/IEC 27001, Information technology — Security techniques — Information security management
systems — Requirements
[8] ISO/IEC 27002, Information technology — Security techniques — Code of practice for information
--`,,```,,,,````-`-`,,`,,`,`,,`---
security management
[9] ISO/IEC 27003, Information technology — Security techniques — Information security management
system implementation guidance
[10] ISO/IEC 27004, Information technology — Security techniques — Information security management —
Measurement
[11] ISO/IEC 27005, Information technology — Security techniques — Information security risk
management
[12] ISO/IEC 27006, Information technology — Security techniques — Requirements for bodies providing
audit and certification of information security management systems
[13] APEC Privacy Framework, APEC#205-SO-01.2. Available from World Wide Web: http://www.apec.org
[14] Convention for the Protection of Human Rights and Fundamental Freedoms, Rome, 4.XI.1950.
Available from World Wide Web:
http://conventions.coe.int/treaty/EN/Treaties/html/005.htm
[15] Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data,
Council of Europe, 28 January 1981. Available from World Wide Web:
http://conventions.coe.int/Treaty/en/Treaties/Word/108.doc
[16] Data Protection Act of Austria, Austrian Data Protection Commission, Government of Austria
[17] Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the
protection of individuals with regard to the processing of personal data and on the free movement of
such data. Available from World Wide Web:
http://eur-
lex.europa.eu/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=en&numdoc=31995L0
046&model=guichett
Copyright International Organization for Standardization © ISO 2009 – All rights reserved 17
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
ISO/TR 12859:2009(E)
[18] Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of privacy in the electronic communications sector
(Directive on privacy and electronic communications). Available from World Wide Web:
http://eur-
lex.europa.eu/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&numdoc=32002L0058&m
odel=guichett&lg=en
[19] NIST Special Publication 800-12, An Introduction to Computer Security: The NIST Handbook
[20] OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, OECD
Document C(80)58(Final), October 1, 1980
18
--`,,```,,,,````-`-`,,`,,`,`,,`---
Copyright International Organization for Standardization © ISO 2009 – All rights reserved
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale
--`,,```,,,,````-`-`,,`,,`,`,,`---
--`,,```,,,,````-`-`,,`,,`,`,,`---
© ISO 2009
Copyright International – Allforrights
Organization reserved
Standardization
Provided by IHS under license with ISO
No reproduction or networking permitted without license from IHS Not for Resale