Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.849
Word version: 14.0.0
0…
4…
4
General description
5
Privacy threats - Description of key issues of Subscriber Privacy Impact (SPI)in 3GPP
6
Solutions / Threat mitigation
7
Privacy guidelines
8
Conclusion
A
OECD privacy principles
B
Privacy regulations
C
Definitions of personal data in different countries or areas
D
The seven foundational principles in Privacy by Design(PbD)
E
GSMA privacy principles
F
Privacy guidelines for writing 3GPP TRs and TSs
$
Change history
4
General description
4.1
Communication model
4.2
Conceptual view
Word‑p. 9
5
Privacy threats - Description of key issues of Subscriber Privacy Impact (SPI)in 3GPP
Word‑p. 10
5.1
Introduction to privacy threat section
5.2
Privacy category related
5.2.1
Key issue #1-1 - Identify protection scope
5.2.1.1
Issue details
5.2.1.2
Threats
5.2.1.3
Potential privacy requirements
5.2.2
Key Issue - personal data
5.2.2.1
Issue details
5.2.2.2
Threats
Word‑p. 11
5.2.2.3
Potential privacy requirements
5.2.3
Key issue - User and UE identity privacy
5.2.3.1
Issue details
5.2.3.2
Threats
Word‑p. 12
5.2.3.3
Potential privacy requirements
5.3
Personal data management lifecycle
5.3.1
Key issue - Collecting privacy related information
5.3.1.1
Issue details
5.3.1.2
Threats
5.3.1.3
Potential privacy requirements
5.3.2
Key Issue - Storage of personal data
5.3.2.1
Issue details
5.3.2.2
Threats
Word‑p. 13
5.3.2.3
Potential privacy requirements
5.3.3
Key issue - Retention of personal data
5.3.3.1
Issue details
5.3.3.2
Threats
5.3.3.3
Potential privacy requirements
5.3.4
Key issue - Personal information disclosure in business collaborations
5.3.4.1
Issue details
5.3.4.2
Threats
5.3.4.3
Potential privacy requirements
5.3.5
Key issue - User privacy choice
Word‑p. 14
5.3.5.1
Issue details
5.3.5.2
Threats
5.3.5.3
Privacy requirements
5.4
Privacy operation and maintenance related
5.4.1
Key Issue - Privacy vs. system functionality
5.4.1.1
Issue details
5.4.1.2
Threats
5.4.1.3
Potential privacy requirements
5.4.2
Key Issue - Privacy role
Word‑p. 15
5.4.2.1
Issue details
5.4.2.2
Threats
5.4.2.3
Potential privacy requirements
6
Solutions / Threat mitigation
6.1
Guidance on applicability
6.2
Solution #1 - Privacy identification process
6.2.0
Introduction
6.2.1
General description
6.1.2
Implementation
Word‑p. 16
6.2a
Threat mitigation - Data minimization
Word‑p. 18
6.3
Threat mitigation- access control
6.3.1
Introduction
6.3.2
Use case
6.4
Threat mitigation - anonymity
6.4.1
Introduction
6.4.2
Use case: UMTS authentication procedure
Word‑p. 19
6.5
Threat mitigation- explicit user consent
6.5.1
Introduction
6.5.2
Use case
7
Privacy guidelines
Word‑p. 20
7.0
Introduction
7.1
Impacts and consequences
7.2
Guidelines
8
Conclusion
Word‑p. 21
A
OECD privacy principles
A.1
OECD privacy principles
A.1.0
Introduction
A.1.1
Collection limitation principle
A.1.2
Data quality principle
Word‑p. 22
A.1.3
Purpose specification principle
A.1.4
Use limitation principle
A.1.5
Security safeguards principle
A.1.6
Openness principle
A.1.7
Individual participation principle
A.1.8
Accountability principle
B
Privacy regulations
Word‑p. 23
C
Definitions of personal data in different countries or areas
Word‑p. 24
D
The seven foundational principles in Privacy by Design(PbD)
Word‑p. 26
E
GSMA privacy principles
Word‑p. 27
F
Privacy guidelines for writing 3GPP TRs and TSs
Word‑p. 28
F.1
Scope
F.2
Introduction
F.3
Threats
F.4
Mitigation techniques
Word‑p. 29
F.5
Privacy identification process
Word‑p. 30
F.6
Guidance for privacy considerations
Word‑p. 31
$
Change history