Consumer protection - Privacy by design for consumer goods and services - Part 2: Use cases

This document provides illustrative use cases, with associated analysis, chosen to assist in understanding the requirements of 31700-1. The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.

Protection des consommateurs — Respect de la vie privée assuré dès la conception des biens de consommation et services aux consommateurs — Partie 2: Cas d’usage

Varstvo potrošnikov - Vgrajena zasebnost za potrošniško blago in storitve - 2. del: Primeri uporabe

Ta dokument podaja ponazoritvene primere uporabe s povezano analizo, ki so izbrani za pomoč pri razumevanju zahtev iz standarda 31700-1.
Ciljne skupine so med drugim inženirji in izvajalci, ki so vključeni v razvoj, izvajanje ali upravljanje digitalno podprtega potrošniškega blaga in storitev.

General Information

Status
Published
Publication Date
30-Jan-2023
Current Stage
9092 - International Standard to be revised
Start Date
25-Apr-2025
Completion Date
30-Oct-2025

Overview

ISO/TR 31700-2:2023 is a technical report that provides illustrative use cases and associated analysis to help implement and interpret the requirements in ISO 31700-1 (Privacy by design for consumer goods and services). The document targets engineers and practitioners involved in the development, deployment and operation of digitally enabled consumer goods and services. It uses a use‑case template (based on IEC 62559-2) and presents sample scenarios-notably on-line retailing, a fitness company and smart locks-to clarify practical privacy‑by‑design challenges and lifecycle decisions.

Key topics and technical requirements

  • Privacy by design across the PII lifecycle: guidance on integrating privacy from initial design through operation, updates and end‑of‑life / retirement of personally identifiable information (PII).
  • Illustrative use‑case analysis: step‑by‑step scenarios that map interactions between consumers, products and ecosystem actors to privacy requirements.
  • ISO 31700-1 requirements explained: structured coverage of the main requirement categories - general, consumer communication, risk management, develop/deploy/operate privacy controls, and end of PII lifecycle.
  • Viewpoints for analysis: consumer product, engineering framework and ecosystem viewpoints to ensure multi‑stakeholder perspectives.
  • Risk management & consumer communication: example approaches for privacy risk assessments, breach communications and responding to consumer inquiries.
  • Mapping to privacy engineering concepts: relationships to privacy protection goals (Unlinkability, Transparency, Intervenability), NIST Privacy Framework functions (Identify, Govern, Control, Communicate, Protect) and engineering objectives (Predictability, Manageability, Disassociability).
  • Use‑case templates: practical format (based on IEC 62559-2) to capture sequence of interactions, roles, risks and required controls.

Practical applications

ISO/TR 31700-2 is practical for:

  • Translating ISO 31700-1 requirements into real world product scenarios
  • Designing privacy controls for connected consumer devices and services
  • Preparing privacy risk assessments, consumer-facing communications and end‑of‑life PII handling plans
  • Training multidisciplinary teams on privacy‑by‑design decision points using concrete examples

Common application areas include: e‑commerce platforms, health & fitness apps and devices, smart home products (e.g., smart locks), IoT device manufacturers, and consumer service providers.

Who should use this standard

  • Privacy engineers and architects
  • Product and firmware developers
  • System integrators and solution designers
  • Compliance, legal and product managers
  • Security and risk teams working on consumer-facing products

Related standards

  • ISO 31700-1 - high‑level requirements for privacy by design in consumer goods and services
  • IEC 62559-2 - use‑case template methodology (basis for the TR’s templates)
  • NIST Privacy Framework - referenced for mapping functions and engineering objectives

Keywords: ISO/TR 31700-2:2023, privacy by design, consumer goods, use cases, PII lifecycle, privacy engineering, ISO 31700-1, NIST Privacy Framework, smart locks, online retailing, fitness apps.

Technical report

TP ISO/TR 31700-2:2024

English language
36 pages
Preview
Preview
e-Library read for
1 day
Technical report

ISO/TR 31700-2:2023 - Consumer protection — Privacy by design for consumer goods and services — Part 2: Use cases Released:1/31/2023

English language
31 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/TR 31700-2:2023 is a technical report published by the International Organization for Standardization (ISO). Its full title is "Consumer protection - Privacy by design for consumer goods and services - Part 2: Use cases". This standard covers: This document provides illustrative use cases, with associated analysis, chosen to assist in understanding the requirements of 31700-1. The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.

This document provides illustrative use cases, with associated analysis, chosen to assist in understanding the requirements of 31700-1. The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of digitally enabled consumer goods and services.

ISO/TR 31700-2:2023 is classified under the following ICS (International Classification for Standards) categories: 03.080.30 - Services for consumers; 03.100.01 - Company organization and management in general. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase ISO/TR 31700-2:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2024
Varstvo potrošnikov - Vgrajena zasebnost za potrošniško blago in storitve - 2. del:
Primeri uporabe
Consumer protection — Privacy by design for consumer goods and services — Part 2:
Use cases
Protection des consommateurs — Respect de la vie privée assuré dès la conception des
biens de consommation et services aux consommateurs — Partie 2: Cas d’usage
Ta slovenski standard je istoveten z: ISO/TR 31700-2:2023
ICS:
03.080.30 Storitve za potrošnike Services for consumers
03.100.01 Organizacija in vodenje Company organization and
podjetja na splošno management in general
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

TECHNICAL ISO/TR
REPORT 31700-2
First edition
2023-01
Consumer protection — Privacy
by design for consumer goods and
services —
Part 2:
Use cases
Protection des consommateurs — Respect de la vie privée assuré
dès la conception des biens de consommation et services aux
consommateurs —
Partie 2: Cas d’usage
Reference number
© ISO 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Overview of ISO 31700-1 requirements and related concepts . 2
5.1 ISO 31700-1 Requirements . 2
5.2 Related concepts . 3
5.3 Viewpoints in the use cases . 6
5.3.1 General . 6
5.3.2 Consumer product viewpoint . 6
5.3.3 Engineering framework viewpoint. 7
5.3.4 Ecosystem viewpoint . 7
6 Use case analysis . 7
6.1 General . 7
6.2 Use case template . 7
7 Use cases . 8
7.1 General . 8
7.2 On-line retailing . 9
7.2.1 On-line retailing use case main description . 9
7.2.2 On-line retailing consumer communication . 11
7.2.3 On-line retailing summary .12
7.2.4 On-line retailing general requirements .13
7.2.5 On-line retailing risk management . 14
7.2.6 On-line retailing development, deployment and operation .15
7.2.7 On-line retailing end of PII lifecycle . 16
7.3 Fitness company . . 17
7.3.1 Fitness company use case main description . 17
7.3.2 Fitness company risk management of health application . 19
7.3.3 Fitness company consumer communication . 20
7.4 Smart locks for homes front doors . 21
7.4.1 Smart locks product line main description . 21
7.4.2 Smart locks basic configuration . 24
7.4.3 Smart locks colocation configuration . 25
7.4.4 Smart locks family configuration . 26
7.4.5 Smart locks risk management . 27
7.4.6 Smart locks consumer communication .28
7.4.7 Smart locks development, deployment and operation .29
Bibliography .31
iii
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Project Committee ISO/PC 317, Consumer Protection – privacy by design
for consumer goods and services.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
iv
Introduction
[1]
ISO 31700-1 provides high-level requirements and recommendations for organizations using privacy
by design in the development, maintenance and operation of consumer goods and services. These are
grounded in a consumer-focused approach, in which consumer privacy rights and preferences are
placed at the heart of product development and operation.
Use case help to identify, clarify and organize system requirements related to a set of goals, by
illustrating a series of possible sequences of interactions between stakeholder(s) and system(s) in a
particular ecosystem.
[2]
The use cases in this document use a template that is based on IEC 62559-2 while enabling a focus on
privacy by design challenges and on the ISO 31700-1 requirements.
Although there are a wide range of use cases, this document provides three sample use cases to help
further understand the implementation of ISO 31700-1: on-line retailing, a fitness company and smart
locks.
v
TECHNICAL REPORT ISO/TR 31700-2:2023(E)
Consumer protection — Privacy by design for consumer
goods and services —
Part 2:
Use cases
1 Scope
This document provides illustrative use cases, with associated analysis, chosen to assist in
understanding the requirements of 31700-1.
The intended audience includes engineers and practitioners who are involved in the development,
implementation or operation of digitally enabled consumer goods and services.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org
3.1
privacy by design
design methodologies in which privacy is considered and integrated into the initial design stage
and throughout the complete lifecycle of products, processes or services that involve processing of
Personally Identifiable Information, including product retirement and the eventual deletion of any
associated personally identifiable information
Note 1 to entry: The lifecycle also includes changes or updates.
[SOURCE: ISO 31700-1:2023, 3.5]
3.2
use case
description of a sequence of interactions of a consumer and a consumer product used to help identify,
clarify, and organize requirements to support a specific business goal
Note 1 to entry: Consumers can be users, engineers, of systems.
Note 2 to entry: A system of interest in this document is a consumer goods or service.
[SOURCE: ISO 31700-1:2023, 3.22, modified — note 2 added]
4 Abbreviated terms
NIST National Institute of Standards and Technology
PII Personally identifiable information
5 Overview of ISO 31700-1 requirements and related concepts
5.1 ISO 31700-1 Requirements
[1]
Table 1 lists ISO 31700-1:2023 requirements, categorised as:
— general (ISO 31700-1:2023, clause 4);
— consumer communication requirements (ISO 31700-1:2023, clause 5);
— risk management requirements (ISO 31700-1:2023, clause 6);
— develop, deploy and operated privacy controls (ISO 31700-1:2023, clause 7);
— end of PII lifecycle requirements (ISO 31700-1:2023, clause 8).
Table 1 — ISO 31700-1 requirements
Category ISO 31700-1 section number and requirement
4.2 Design capabilities to enable consumers to enforce their privacy rights
4.3 Develop capability to determine consumer privacy preferences
4.4 Design human computer interface (HCI) for privacy
4.5 Assign relevant roles and authorities
General
4.6 Establish multi-disciplinary responsibilities
4.7 Develop privacy knowledge, skill and ability
4.8 Ensure knowledge of privacy controls
4.9 Documented information management
5.2 Provision of privacy information
5.3 Accountability of responsible persons to providing privacy information
Consumer communica-
5.4 Responding to consumer inquiries and complaints
tion requirements
5.5 Communicating to diverse consumer population
5.6 Prepare data breach communications
6.2 Conduct a privacy risk assessment
6.3 Assess privacy capabilities of third parties
Risk management re-
6.4 Establish and document requirements for privacy controls
quirements
6.5 Monitor and update risk assessment
6.6 Include privacy risks in cybersecurity resilience design
TTabablele 1 1 ((ccoonnttiinnueuedd))
Category ISO 31700-1 section number and requirement
7.2 Integrate the design and operation of privacy controls into the products develop-
ment and management lifecycles
7.3 Design privacy controls
7.4 Implement privacy controls
Develop, deploy and
7.5 Design privacy control testing
operate designed privacy
7.6 Manage the transition of privacy controls
controls
7.7 Manage the operation of privacy controls
7.8 Prepare breach management
7.9 Operate privacy controls for the processes and products that the product in
scope depends upon through the PII lifecycle
End of PII lifecycle re-
8.2 Design privacy controls for retirement and end of use
quirements
5.2 Related concepts
The tables in this clause illustrate the relationships between the requirements of ISO 31700-1 and
related privacy engineering concepts:
— lifecycle processes as shown in Table 2;
[5]
— privacy protection goals, as shown in Table 3.
[7]
— NIST Privacy framework functions, as shown in Table 4;
— NIST privacy engineering objectives as shown in Table 5.
The resulting relations are shown in Table 6.
Table 2 — Lifecycle processes
Activities carried out by the organisation to define and maintain policies related to
Organisation policies
privacy by design
Product design and Activities carried out by the organisation to design and develop consumer goods or
development services
Activities carried out by the organisation to manage privacy when consumer goods or
Product use
services are in use
Table 3 — Privacy protection goals
Property that privacy-relevant data cannot be linked across domains that are consti-
tuted by a common purpose and context
Unlinkability
NOTE It ensures that a PII principal can make multiple uses of resources or services
without others being able to link these uses together
Property that ensures that all privacy-relevant data processing including the legal,
Transparency
technical and organizational setting can be understood as documented or stated
Property that ensures that PII principals, PII controllers, PII processors and supervi-
Intervenability
[12]
sory authorities can intervene in all privacy-relevant data processing
Table 4 — NIST Privacy Framework functions
Develop the organizational understanding to manage privacy risk for individuals aris-
Identify-P
ing from data processing
TTabablele 4 4 ((ccoonnttiinnueuedd))
Develop and implement the organizational governance structure to enable an ongoing
Govern-P understanding of the organization’s risk management priorities that are informed by
privacy risk
Develop and implement appropriate activities to enable organizations or individuals
to manage data with sufficient granularity to manage privacy risks
Control-P
Develop and implement appropriate activities to enable organizations and individuals
Communicate-P to have a reliable understanding and engage in a dialogue about how data are pro-
cessed and associated privacy risks
Protect-P Develop and implement appropriate data processing safeguards
Table 5 — NIST privacy engineering objectives
Enabling reliable assumptions by individuals, owners, and operators about data and
Predictability
their processing by a system, product, or service
Providing the capability for granular administration of data, including alteration, dele-
Manageability
tion, and selective disclosure
Enabling the processing of data or events without association to individuals or devices
Disassociability
beyond the operational requirements of the system
Table 6 — ISO 31700-1 requirements relationship with associated concepts
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
4.2 Design capabil-
Intervenability Predictablity
ities to enable con- Product design Control-P, Com-
sumers to enforce and development municate-P
Transparency Manageability
their privacy rights
4.3 Develop capa-
Intervenability
bility to determine Product design Control-P, Com-
Predictability
consumer privacy and development municate-P
Transparency
preferences
4.4 Design human
Predictablity
Product design
computer interface Transparency Communicate-P
and development
Manageability
(HCI) for privacy
4.5 Assign relevant
Organisation
roles and authori- - Govern-p Manageability
policies
General
ties
4.6 Establish
Organisation
multi-disciplinary - Govern-P Manageability
policies
responsibilities
4.7 Develop privacy
Organisation
knowledge, skill - Govern-P Manageability
policies
and ability
4.8 Ensure knowl-
Manageability
Organisation
edge of privacy - Govern-P
policies
Disassociability
controls
4.9 Documented
Organisation
information man- - Govern-P Manageability
policies
agement
TTabablele 6 6 ((ccoonnttiinnueuedd))
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
5.2 Provision of pri- Organisation
Transparency Communicate-P Predictability
vacy information policies
5.3 Accountability
Predictability
of responsible per- Organisation Govern-P Com-
Transparency
sons to providing policies municate-P
Manageability
privacy information
Consumer 5.4 Responding to
Predictability
communication consumer inquiries Product use Transparency Communicate-P
Manageability
requirements and complaints
5.5 Communicating
to diverse consumer Product use Transparency Communicate-P Predictability
population
5.6 Prepare data
breach communica- Product use Transparency Communicate-P Predictability
tions
Product design Predictability
6.2 Conduct a priva- and development
Unlinkability Identify-P Manageability
cy risk assessment
Disassociability
Product design Predictability
6.3 Assess privacy
and development Identify-P, Pro-
capabilities of third Unlinkability Manageability
tect-P
parties
Disassociability
6.4 Establish and Product design Unlinkability Predictability
Risk manage- Identify-P, Con-
document require- and development
ment require- Intervenability trol-P, Communi- Manageability
ments for privacy
ments cate-P
controls
Transparency Disassociability
Product design Predictability
6.5 Monitor and
Identify-P,
and development
update risk assess- Unlinkability Manageability
Govern-P
ment
Disassociability
6.6 Include privacy
risks in cyberse- Organisation Identify-P, Pro-
Unlinkability -
curity resilience policies tect-P
design
TTabablele 6 6 ((ccoonnttiinnueuedd))
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
7.2 Integrate the de-
sign and operation
Unlinkability Predictability
of privacy controls
Organisation
into the products Intervenability Protect-P Manageability
policies
development and
Transparency Disassociability
management life-
cycles
Product design Unlinkability Predictability
7.3 Design privacy and development
Intervenability Protect-P Manageability
controls
Transparency Disassociability
Product design Unlinkability Predictability
7.4 Implement pri- and development
Intervenability Protect-P Manageability
vacy controls
Transparency Disassociability
Product design Unlinkability Predictability
7.5 Design privacy and development
Develop, deploy
Intervenability Protect-P Manageability
control testing
and operate
Transparency Disassociability
designed privacy
controls
Predictability
7.6 Manage the
Intervenability
Organisation Control-P, Com-
transition of priva- Manageability
policies municate-P
Transparency
cy controls
Disassociability
Predictability
7.7 Manage the
Intervenability
Organisation Control-P, Com-
operation of privacy Manageability
policies municate-P
Transparency
controls
Disassociability
7.8 Prepare breach Organisation - Protect-P, Con-
-
management policies trol-P
7.9 Operate privacy
controls for the pro-
cesses and products
Control-P, Com-
that the product in Product use - -
municate-P
scope depends upon
through the PII
lifecycle
Predictability
8.2 Design privacy
End of PII lifecy- Product design Control-P, Com-
controls for retire- - Manageability
cle requirements and development municate-P
ment and end of use
Disassociability
5.3 Viewpoints in the use cases
5.3.1 General
The viewpoints presented here are shown in the sequence diagrams of the use cases in Clause 7.
5.3.2 Consumer product viewpoint
Consumer products and associated organisational practices protect consumers’ privacy when the
product is in use and throughout the PII lifecycle while the PII is under the organisation’s purview.
Considering how a product is likely to be used in practice, during product development, can require a
number of different contexts and situations to be evaluated. Different users with different capabilities
are catered for. This applies as the product, once in the possession of a consumer user, is operated in
unconstrained circumstances where the consumer’s understanding and abilities can, and often do, vary
considerably.
For each type of use the precise definition of use is coupled with an accurate description of how the
product and any associated organisational processes would operate so as to protect privacy.
Finally, consumer use can change over time and vary between cultures or demographic groups.
5.3.3 Engineering framework viewpoint
The development and management of privacy controls is an essential part of the engineering of
consumers products. The resulting engineering framework combines:
[3]
— processes based on standards such as ISO/IEC/IEEE 15288 ;
— extensions of such processes that integrate privacy engineering. These extensions can be based on
[5] [7]
ISO/IEC TR 27550, with the support of frameworks such as the NIST Privacy Framework, the
[6]
use of OASIS PMRM to operationalize privacy principles;
[1]
— the integration of the consumer product viewpoint, which is supported by ISO 31700-1 .
NOTE An additional reference to OASIS PMRM is under development: ISO/IEC 27561, Information technology
— Privacy operationalisation model and method for engineers — POMME
5.3.4 Ecosystem viewpoint
Consumer products involve two ecosystems:
— the supply chain, i.e., the ecosystem associated with the system lifecycle process. This involves
organisation and contractual activities on the privacy capabilities provided by third parties;
— the data space, i.e., the ecosystem associated with users and providers of data. This involves
organisation and contractual activities on data sharing.
6 Use case analysis
6.1 General
A use case template was developed to help illustrate, in a consistent manner, the use case examples. The
template is structured to provide the information that illustrates the use of ISO 31700-1.
— The entries for the main narrative are general. They include ID: use case name; description of
product, service or process; privacy protection goal; ecosystem and systems of interest; users,
stakeholders; PII; purpose; and use case narrative.
— The entries for the extended narratives follow the requirements of ISO 31700-1: general requirements;
consumer communication requirements; risk management requirements; development, deployment
and operations of designed privacy controls; and end of PII lifecycle requirements.
6.2 Use case template
Table 7 provides a template for the main narrative of a use case.
Table 7 — Template for main narrative
Entry Entry description
ID Unique identification
TTabablele 7 7 ((ccoonnttiinnueuedd))
Entry Entry description
Use case name Meaningful name
Description of product, ser- Short description of product
vice or process
Privacy protection goal Short description of privacy protection goals
Ecosystem and systems of Describe systems of interest
interest
Users Describe users
Stakeholders Describe stakeholders
PII Describe PII collected
Purpose Describe purpose of PII collection
Main narrative Short narrative on consumer goods and services (possibly with a sequence
diagram)
Table 8 provides a template for the extended narratives of a use case.
Table 8 — Template for extended narratives
Entry Entry description
ID Unique identification
Use case name Meaningful name
Narrative describing a specific variation, or focusing on the use of requirements
Additional narrative in a specific clause of ISO 31700-1. When possible, a sequence diagram is provid-
ed. Table 9 lists possible categories of narratives.
Table 9 lists proposed categories of extended narratives. They match categories of ISO 31700-1
requirements.
Table 9 — Categories of extended narratives
Category of extended narratives Relationship with ISO 31700-1
General requirements Focus on ISO 31700-1:2023, 4.2 to 4.9
Consumer
...


TECHNICAL ISO/TR
REPORT 31700-2
First edition
2023-01
Consumer protection — Privacy
by design for consumer goods and
services —
Part 2:
Use cases
Protection des consommateurs — Respect de la vie privée assuré
dès la conception des biens de consommation et services aux
consommateurs —
Partie 2: Cas d’usage
Reference number
© ISO 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Overview of ISO 31700-1 requirements and related concepts . 2
5.1 ISO 31700-1 Requirements . 2
5.2 Related concepts . 3
5.3 Viewpoints in the use cases . 6
5.3.1 General . 6
5.3.2 Consumer product viewpoint . 6
5.3.3 Engineering framework viewpoint. 7
5.3.4 Ecosystem viewpoint . 7
6 Use case analysis . 7
6.1 General . 7
6.2 Use case template . 7
7 Use cases . 8
7.1 General . 8
7.2 On-line retailing . 9
7.2.1 On-line retailing use case main description . 9
7.2.2 On-line retailing consumer communication . 11
7.2.3 On-line retailing summary .12
7.2.4 On-line retailing general requirements .13
7.2.5 On-line retailing risk management . 14
7.2.6 On-line retailing development, deployment and operation .15
7.2.7 On-line retailing end of PII lifecycle . 16
7.3 Fitness company . . 17
7.3.1 Fitness company use case main description . 17
7.3.2 Fitness company risk management of health application . 19
7.3.3 Fitness company consumer communication . 20
7.4 Smart locks for homes front doors . 21
7.4.1 Smart locks product line main description . 21
7.4.2 Smart locks basic configuration . 24
7.4.3 Smart locks colocation configuration . 25
7.4.4 Smart locks family configuration . 26
7.4.5 Smart locks risk management . 27
7.4.6 Smart locks consumer communication .28
7.4.7 Smart locks development, deployment and operation .29
Bibliography .31
iii
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Project Committee ISO/PC 317, Consumer Protection – privacy by design
for consumer goods and services.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
iv
Introduction
[1]
ISO 31700-1 provides high-level requirements and recommendations for organizations using privacy
by design in the development, maintenance and operation of consumer goods and services. These are
grounded in a consumer-focused approach, in which consumer privacy rights and preferences are
placed at the heart of product development and operation.
Use case help to identify, clarify and organize system requirements related to a set of goals, by
illustrating a series of possible sequences of interactions between stakeholder(s) and system(s) in a
particular ecosystem.
[2]
The use cases in this document use a template that is based on IEC 62559-2 while enabling a focus on
privacy by design challenges and on the ISO 31700-1 requirements.
Although there are a wide range of use cases, this document provides three sample use cases to help
further understand the implementation of ISO 31700-1: on-line retailing, a fitness company and smart
locks.
v
TECHNICAL REPORT ISO/TR 31700-2:2023(E)
Consumer protection — Privacy by design for consumer
goods and services —
Part 2:
Use cases
1 Scope
This document provides illustrative use cases, with associated analysis, chosen to assist in
understanding the requirements of 31700-1.
The intended audience includes engineers and practitioners who are involved in the development,
implementation or operation of digitally enabled consumer goods and services.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org
3.1
privacy by design
design methodologies in which privacy is considered and integrated into the initial design stage
and throughout the complete lifecycle of products, processes or services that involve processing of
Personally Identifiable Information, including product retirement and the eventual deletion of any
associated personally identifiable information
Note 1 to entry: The lifecycle also includes changes or updates.
[SOURCE: ISO 31700-1:2023, 3.5]
3.2
use case
description of a sequence of interactions of a consumer and a consumer product used to help identify,
clarify, and organize requirements to support a specific business goal
Note 1 to entry: Consumers can be users, engineers, of systems.
Note 2 to entry: A system of interest in this document is a consumer goods or service.
[SOURCE: ISO 31700-1:2023, 3.22, modified — note 2 added]
4 Abbreviated terms
NIST National Institute of Standards and Technology
PII Personally identifiable information
5 Overview of ISO 31700-1 requirements and related concepts
5.1 ISO 31700-1 Requirements
[1]
Table 1 lists ISO 31700-1:2023 requirements, categorised as:
— general (ISO 31700-1:2023, clause 4);
— consumer communication requirements (ISO 31700-1:2023, clause 5);
— risk management requirements (ISO 31700-1:2023, clause 6);
— develop, deploy and operated privacy controls (ISO 31700-1:2023, clause 7);
— end of PII lifecycle requirements (ISO 31700-1:2023, clause 8).
Table 1 — ISO 31700-1 requirements
Category ISO 31700-1 section number and requirement
4.2 Design capabilities to enable consumers to enforce their privacy rights
4.3 Develop capability to determine consumer privacy preferences
4.4 Design human computer interface (HCI) for privacy
4.5 Assign relevant roles and authorities
General
4.6 Establish multi-disciplinary responsibilities
4.7 Develop privacy knowledge, skill and ability
4.8 Ensure knowledge of privacy controls
4.9 Documented information management
5.2 Provision of privacy information
5.3 Accountability of responsible persons to providing privacy information
Consumer communica-
5.4 Responding to consumer inquiries and complaints
tion requirements
5.5 Communicating to diverse consumer population
5.6 Prepare data breach communications
6.2 Conduct a privacy risk assessment
6.3 Assess privacy capabilities of third parties
Risk management re-
6.4 Establish and document requirements for privacy controls
quirements
6.5 Monitor and update risk assessment
6.6 Include privacy risks in cybersecurity resilience design
TTabablele 1 1 ((ccoonnttiinnueuedd))
Category ISO 31700-1 section number and requirement
7.2 Integrate the design and operation of privacy controls into the products develop-
ment and management lifecycles
7.3 Design privacy controls
7.4 Implement privacy controls
Develop, deploy and
7.5 Design privacy control testing
operate designed privacy
7.6 Manage the transition of privacy controls
controls
7.7 Manage the operation of privacy controls
7.8 Prepare breach management
7.9 Operate privacy controls for the processes and products that the product in
scope depends upon through the PII lifecycle
End of PII lifecycle re-
8.2 Design privacy controls for retirement and end of use
quirements
5.2 Related concepts
The tables in this clause illustrate the relationships between the requirements of ISO 31700-1 and
related privacy engineering concepts:
— lifecycle processes as shown in Table 2;
[5]
— privacy protection goals, as shown in Table 3.
[7]
— NIST Privacy framework functions, as shown in Table 4;
— NIST privacy engineering objectives as shown in Table 5.
The resulting relations are shown in Table 6.
Table 2 — Lifecycle processes
Activities carried out by the organisation to define and maintain policies related to
Organisation policies
privacy by design
Product design and Activities carried out by the organisation to design and develop consumer goods or
development services
Activities carried out by the organisation to manage privacy when consumer goods or
Product use
services are in use
Table 3 — Privacy protection goals
Property that privacy-relevant data cannot be linked across domains that are consti-
tuted by a common purpose and context
Unlinkability
NOTE It ensures that a PII principal can make multiple uses of resources or services
without others being able to link these uses together
Property that ensures that all privacy-relevant data processing including the legal,
Transparency
technical and organizational setting can be understood as documented or stated
Property that ensures that PII principals, PII controllers, PII processors and supervi-
Intervenability
[12]
sory authorities can intervene in all privacy-relevant data processing
Table 4 — NIST Privacy Framework functions
Develop the organizational understanding to manage privacy risk for individuals aris-
Identify-P
ing from data processing
TTabablele 4 4 ((ccoonnttiinnueuedd))
Develop and implement the organizational governance structure to enable an ongoing
Govern-P understanding of the organization’s risk management priorities that are informed by
privacy risk
Develop and implement appropriate activities to enable organizations or individuals
to manage data with sufficient granularity to manage privacy risks
Control-P
Develop and implement appropriate activities to enable organizations and individuals
Communicate-P to have a reliable understanding and engage in a dialogue about how data are pro-
cessed and associated privacy risks
Protect-P Develop and implement appropriate data processing safeguards
Table 5 — NIST privacy engineering objectives
Enabling reliable assumptions by individuals, owners, and operators about data and
Predictability
their processing by a system, product, or service
Providing the capability for granular administration of data, including alteration, dele-
Manageability
tion, and selective disclosure
Enabling the processing of data or events without association to individuals or devices
Disassociability
beyond the operational requirements of the system
Table 6 — ISO 31700-1 requirements relationship with associated concepts
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
4.2 Design capabil-
Intervenability Predictablity
ities to enable con- Product design Control-P, Com-
sumers to enforce and development municate-P
Transparency Manageability
their privacy rights
4.3 Develop capa-
Intervenability
bility to determine Product design Control-P, Com-
Predictability
consumer privacy and development municate-P
Transparency
preferences
4.4 Design human
Predictablity
Product design
computer interface Transparency Communicate-P
and development
Manageability
(HCI) for privacy
4.5 Assign relevant
Organisation
roles and authori- - Govern-p Manageability
policies
General
ties
4.6 Establish
Organisation
multi-disciplinary - Govern-P Manageability
policies
responsibilities
4.7 Develop privacy
Organisation
knowledge, skill - Govern-P Manageability
policies
and ability
4.8 Ensure knowl-
Manageability
Organisation
edge of privacy - Govern-P
policies
Disassociability
controls
4.9 Documented
Organisation
information man- - Govern-P Manageability
policies
agement
TTabablele 6 6 ((ccoonnttiinnueuedd))
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
5.2 Provision of pri- Organisation
Transparency Communicate-P Predictability
vacy information policies
5.3 Accountability
Predictability
of responsible per- Organisation Govern-P Com-
Transparency
sons to providing policies municate-P
Manageability
privacy information
Consumer 5.4 Responding to
Predictability
communication consumer inquiries Product use Transparency Communicate-P
Manageability
requirements and complaints
5.5 Communicating
to diverse consumer Product use Transparency Communicate-P Predictability
population
5.6 Prepare data
breach communica- Product use Transparency Communicate-P Predictability
tions
Product design Predictability
6.2 Conduct a priva- and development
Unlinkability Identify-P Manageability
cy risk assessment
Disassociability
Product design Predictability
6.3 Assess privacy
and development Identify-P, Pro-
capabilities of third Unlinkability Manageability
tect-P
parties
Disassociability
6.4 Establish and Product design Unlinkability Predictability
Risk manage- Identify-P, Con-
document require- and development
ment require- Intervenability trol-P, Communi- Manageability
ments for privacy
ments cate-P
controls
Transparency Disassociability
Product design Predictability
6.5 Monitor and
Identify-P,
and development
update risk assess- Unlinkability Manageability
Govern-P
ment
Disassociability
6.6 Include privacy
risks in cyberse- Organisation Identify-P, Pro-
Unlinkability -
curity resilience policies tect-P
design
TTabablele 6 6 ((ccoonnttiinnueuedd))
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
7.2 Integrate the de-
sign and operation
Unlinkability Predictability
of privacy controls
Organisation
into the products Intervenability Protect-P Manageability
policies
development and
Transparency Disassociability
management life-
cycles
Product design Unlinkability Predictability
7.3 Design privacy and development
Intervenability Protect-P Manageability
controls
Transparency Disassociability
Product design Unlinkability Predictability
7.4 Implement pri- and development
Intervenability Protect-P Manageability
vacy controls
Transparency Disassociability
Product design Unlinkability Predictability
7.5 Design privacy and development
Develop, deploy
Intervenability Protect-P Manageability
control testing
and operate
Transparency Disassociability
designed privacy
controls
Predictability
7.6 Manage the
Intervenability
Organisation Control-P, Com-
transition of priva- Manageability
policies municate-P
Transparency
cy controls
Disassociability
Predictability
7.7 Manage the
Intervenability
Organisation Control-P, Com-
operation of privacy Manageability
policies municate-P
Transparency
controls
Disassociability
7.8 Prepare breach Organisation - Protect-P, Con-
-
management policies trol-P
7.9 Operate privacy
controls for the pro-
cesses and products
Control-P, Com-
that the product in Product use - -
municate-P
scope depends upon
through the PII
lifecycle
Predictability
8.2 Design privacy
End of PII lifecy- Product design Control-P, Com-
controls for retire- - Manageability
cle requirements and development municate-P
ment and end of use
Disassociability
5.3 Viewpoints in the use cases
5.3.1 General
The viewpoints presented here are shown in the sequence diagrams of the use cases in Clause 7.
5.3.2 Consumer product viewpoint
Consumer products and associated organisational practices protect consumers’ privacy when the
product is in use and throughout the PII lifecycle while the PII is under the organisation’s purview.
Considering how a product is likely to be used in practice, during product development, can require a
number of different contexts and situations to be evaluated. Different users with different capabilities
are catered for. This applies as the product, once in the possession of a consumer user, is operated in
unconstrained circumstances where the consumer’s understanding and abilities can, and often do, vary
considerably.
For each type of use the precise definition of use is coupled with an accurate description of how the
product and any associated organisational processes would operate so as to protect privacy.
Finally, consumer use can change over time and vary between cultures or demographic groups.
5.3.3 Engineering framework viewpoint
The development and management of privacy controls is an essential part of the engineering of
consumers products. The resulting engineering framework combines:
[3]
— processes based on standards such as ISO/IEC/IEEE 15288 ;
— extensions of such processes that integrate privacy engineering. These extensions can be based on
[5] [7]
ISO/IEC TR 27550, with the support of frameworks such as the NIST Privacy Framework, the
[6]
use of OASIS PMRM to operationalize privacy principles;
[1]
— the integration of the consumer product viewpoint, which is supported by ISO 31700-1 .
NOTE An additional reference to OASIS PMRM is under development: ISO/IEC 27561, Information technology
— Privacy operationalisation model and method for engineers — POMME
5.3.4 Ecosystem viewpoint
Consumer products involve two ecosystems:
— the supply chain, i.e., the ecosystem associated with the system lifecycle process. This involves
organisation and contractual activities on the privacy capabilities provided by third parties;
— the data space, i.e., the ecosystem associated with users and providers of data. This involves
organisation and contractual activities on data sharing.
6 Use case analysis
6.1 General
A use case template was developed to help illustrate, in a consistent manner, the use case examples. The
template is structured to provide the information that illustrates the use of ISO 31700-1.
— The entries for the main narrative are general. They include ID: use case name; description of
product, service or process; privacy protection goal; ecosystem and systems of interest; users,
stakeholders; PII; purpose; and use case narrative.
— The entries for the extended narratives follow the requirements of ISO 31700-1: general requirements;
consumer communication requirements; risk management requirements; development, deployment
and operations of designed privacy controls; and end of PII lifecycle requirements.
6.2 Use case template
Table 7 provides a template for the main narrative of a use case.
Table 7 — Template for main narrative
Entry Entry description
ID Unique identification
TTabablele 7 7 ((ccoonnttiinnueuedd))
Entry Entry description
Use case name Meaningful name
Description of product, ser- Short description of product
vice or process
Privacy protection goal Short description of privacy protection goals
Ecosystem and systems of Describe systems of interest
interest
Users Describe users
Stakeholders Describe stakeholders
PII Describe PII collected
Purpose Describe purpose of PII collection
Main narrative Short narrative on consumer goods and services (possibly with a sequence
diagram)
Table 8 provides a template for the extended narratives of a use case.
Table 8 — Template for extended narratives
Entry Entry description
ID Unique identification
Use case name Meaningful name
Narrative describing a specific variation, or focusing on the use of requirements
Additional narrative in a specific clause of ISO 31700-1. When possible, a sequence diagram is provid-
ed. Table 9 lists possible categories of narratives.
Table 9 lists proposed categories of extended narratives. They match categories of ISO 31700-1
requirements.
Table 9 — Categories of extended narratives
Category of extended narratives Relationship with ISO 31700-1
General requirements Focus on ISO 31700-1:2023, 4.2 to 4.9
Consumer communication requirements Focus on ISO 31700-1:2023, 5.2 to 5.6
Risk management requirements Focus on ISO 31700-1:2023, 6.2 to 6.6
Development, deployment and operation of
Focus on ISO 31700-1;2023, 7.2 to 7.9
designed privacy controls
End of PII lifecycle requirements Focus on ISO 31700-1:2023, 8.2
7 Use cases
7.1 General
Three use cases are described: on-line retailing, a fitness company and smart locks. These use cases
cover ISO 31700-1
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

ISO/TR 31700-2:2023 presents a comprehensive examination of the intersection between consumer protection and privacy by design within the context of consumer goods and services. The standard’s scope is meticulously defined, aiming to illuminate the requirements outlined in ISO 31700-1 through a series of illustrative use cases. This is particularly significant for engineers and practitioners who engage in the development, implementation, or operation of digitally enabled products and services. One of the key strengths of this standard lies in its practical approach. By providing real-world use cases, ISO/TR 31700-2:2023 facilitates a nuanced understanding of privacy by design principles and their application. This functionality empowers stakeholders to grasp complex concepts and effectively integrate privacy considerations into their workflows. Furthermore, the relevance of ISO/TR 31700-2:2023 cannot be overstated, especially in an era where consumer trust and data protection are paramount. This document serves as an essential resource for professionals seeking to align with emerging regulatory expectations and industry standards. By outlining explicit scenarios, it allows users to envision the practical implications of privacy requirements, thereby promoting a culture of responsibility and accountability in the design of consumer goods and services. In summary, ISO/TR 31700-2:2023 not only enhances the understanding of privacy by design but also acts as a crucial tool for ensuring consumer protection in the fast-evolving landscape of digitized products and services. Its targeted focus on use cases makes it a valuable asset for practitioners aiming to navigate the complexities of privacy compliance effectively.

ISO/TR 31700-2:2023 문서는 소비자 보호와 프라이버시 설계에 관한 중요한 지침을 제공합니다. 이 표준의 범위는 소비재 및 서비스의 프라이버시를 설계하는 데 있어 필요한 매우 구체적인 사용 사례를 제시하고 있습니다. 특히, 이 문서는 ISO 31700-1의 요구 사항을 이해하는 데 도움을 주기 위해 선택된 다양한 사례와 함께 그에 대한 분석을 제공합니다. 이 표준의 강점 중 하나는 실제적인 사례를 통해 복잡한 프라이버시 개념을 쉽게 이해할 수 있도록 하여 엔지니어와 실무자가 제품 개발 및 실행 과정에서 보다 나은 결정을 내릴 수 있도록 지원한다는 점입니다. 사용 사례는 다양한 소비재와 서비스에 걸쳐 제공되며, 이에 따라 폭넓은 적용 가능성을 가지게 됩니다. 또한, 각 사례는 관련 분석을 포함하여 이론적인 부분과 실무적인 부분을 연결하는 데 도움을 줍니다. ISO/TR 31700-2:2023은 소비자의 프라이버시를 보호하기 위한 중요성을 강조하며, 디지털 소비재와 서비스의 설계 및 운영에서 이러한 원칙들이 어떻게 구현될 수 있는지를 명확하게 제시합니다. 이는 현재의 소비자 보호 환경에서 매우 중요한 요소로 부각되고 있으며, 엔지니어와 실무자가 보다 신뢰할 수 있는 제품과 서비스를 제공하는 데 기여하는 바가 큽니다. 따라서, 이 표준은 소비자 보호와 프라이버시 설계 분야에서의 필수적인 참조 문서로 자리매김할 것으로 보입니다.

ISO/TR 31700-2:2023は、消費者保護に関するプライバシー設計について、具体的な使用例を提供する重要な文書です。本標準は、デジタル対応の消費財やサービスの開発、実施、運用に関与するエンジニアや実務者に向けて設計されており、彼らが31700-1の要件を理解するのを助けるためのものです。 この標準の強みは、具体的な使用例を通じてプライバシーの設計に関する理念を実践的に示している点です。標準文書は、理論的な枠組みだけでなく、実際的な実装に役立つケーススタディを提供し、読者が各要件をどのように具現化するかを分かりやすく解説しています。これにより、エンジニアや実務者は自社の製品やサービスにおけるプライバシー保護への適切なアプローチを確立できるでしょう。 さらに、ISO/TR 31700-2:2023の relevance は、持続可能な消費の促進やユーザーに対する信頼性の向上に寄与します。消費者のプライバシーが確保されることで、ブランドの価値も向上し、市場競争力を強化する要素となります。 このようにISO/TR 31700-2:2023は、プライバシーを設計に組み込むための実践的かつ有用なガイドラインを提供しており、デジタル時代における消費者保護の面でも非常に重要な役割を果たしています。

Le document ISO/TR 31700-2:2023 traite de la protection des consommateurs, en mettant l'accent sur la notion de "Privacy by design" pour les biens et services de consommation. Son champ d'application est clair : il fournit des cas d'utilisation illustratifs, accompagnés d'analyses ciblées, afin d'aider à mieux comprendre les exigences énoncées dans le document ISO 31700-1. Cela est particulièrement pertinent pour les ingénieurs et les praticiens travaillant dans le développement, la mise en œuvre ou l'exploitation de biens et services de consommation numériquement connectés. Parmi les forces de cette norme, on peut souligner qu'elle offre une approche pratique et accessible pour intégrer la protection des données personnelles dès la phase de conception des produits et services. Ces cas d'utilisation illustratifs permettent une visualisation concrète des défis et solutions associés à la mise en œuvre des principes de "Privacy by design". De plus, la norme favorise une meilleure conformité aux réglementations en matière de protection de la vie privée, ce qui est essentiel dans un contexte où les consommateurs sont de plus en plus conscients des enjeux liés à leur vie privée. La pertinence de l'ISO/TR 31700-2:2023 ne peut être sous-estimée dans un environnement numérique en constante évolution, où la confiance des consommateurs est cruciale pour les entreprises. En jouant un rôle clé dans la sensibilisation et l'éducation des professionnels sur les pratiques de protection des données, cette norme contribue à promouvoir des produits et services qui respectent réellement la vie privée des utilisateurs. En résumé, l'ISO/TR 31700-2:2023 se distingue par son approche illustrée et sa capacité à relier les concepts théoriques aux réalités de l'industrie, positionnant ainsi la norme comme un outil essentiel pour les acteurs du marché souhaitant optimiser la protection des consommateurs et assurer une conception éthique de leurs offres.

Die ISO/TR 31700-2:2023 bietet ein wertvolles Instrument zur Unterstützung des Verständnisses der Anforderungen von ISO 31700-1. Dieser Teil der Norm konzentriert sich auf illustrative Anwendungsfälle in Verbindung mit einer eingehenden Analyse, was zu einem besseren Verständnis der Implementierung von Datenschutz durch Design für Konsumgüter und -dienstleistungen beiträgt. Ein großes Plus der ISO/TR 31700-2:2023 ist die klare Ausrichtung auf Ingenieure und Fachleute, die in der Entwicklung, Implementierung oder dem Betrieb von digital unterstützten Konsumgütern und -dienstleistungen tätig sind. Dadurch wird sichergestellt, dass die Norm nicht nur theoretische Konzepte behandelt, sondern auch praxisnahe Lösungen und Umsetzungsstrategien bietet, die direkt im Arbeitsumfeld angewendet werden können. Die Stärke dieser Norm liegt auch in der detaillierten Analyse der Use Cases, die dazu beitragen, verschiedene Szenarien und Herausforderungen im Kontext des Verbraucherschutzes und der Datensicherheit zu beleuchten. Solche Anwendungsfälle fördern das Verständnis der spezifischen Anforderungen und helfen den Fachleuten, sich ein umfassendes Bild von den Möglichkeiten und den damit verbundenen Verpflichtungen zu machen. Zudem gewährt die ISO/TR 31700-2:2023 eine wertvolle Orientierung, um sicherzustellen, dass Datenschutz und Privatsphäre von Anfang an in den Entwicklungsprozess von Konsumgütern integriert werden. Dies ist nicht nur rechtlich relevant, sondern spielt auch eine entscheidende Rolle bei der Schaffung von Vertrauen bei den Verbrauchern, was in der heutigen digitalen Welt unerlässlich ist. Insgesamt stellt die ISO/TR 31700-2:2023 einen wichtigen Beitrag zur Sicherstellung des Verbraucherschutzes dar, indem sie sowohl eine klare strukturierte Vorgehensweise als auch spezifische Anwendungsbeispiele bietet, die die Relevanz des Datenschutzes in der Produktentwicklung unterstreichen.